Dec 13 14:29:19.190433 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:29:19.190646 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:29:19.190670 kernel: BIOS-provided physical RAM map: Dec 13 14:29:19.190684 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 14:29:19.190697 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 14:29:19.190840 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 14:29:19.190863 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 14:29:19.190878 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 14:29:19.190890 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 14:29:19.190911 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 14:29:19.191001 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 14:29:19.191015 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 14:29:19.191028 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 14:29:19.191042 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 14:29:19.191063 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 14:29:19.191078 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 14:29:19.191092 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 14:29:19.191106 kernel: NX (Execute Disable) protection: active Dec 13 14:29:19.191120 kernel: efi: EFI v2.70 by EDK II Dec 13 14:29:19.191134 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 14:29:19.191148 kernel: random: crng init done Dec 13 14:29:19.191162 kernel: SMBIOS 2.4 present. Dec 13 14:29:19.191181 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 14:29:19.191195 kernel: Hypervisor detected: KVM Dec 13 14:29:19.191209 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:29:19.191223 kernel: kvm-clock: cpu 0, msr 4719a001, primary cpu clock Dec 13 14:29:19.191237 kernel: kvm-clock: using sched offset of 12783744642 cycles Dec 13 14:29:19.191252 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:29:19.191268 kernel: tsc: Detected 2299.998 MHz processor Dec 13 14:29:19.191283 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:29:19.191298 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:29:19.191313 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 14:29:19.191331 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:29:19.191346 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 14:29:19.191360 kernel: Using GB pages for direct mapping Dec 13 14:29:19.191375 kernel: Secure boot disabled Dec 13 14:29:19.191390 kernel: ACPI: Early table checksum verification disabled Dec 13 14:29:19.191404 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 14:29:19.191419 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 14:29:19.191434 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 14:29:19.191458 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 14:29:19.191474 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 14:29:19.191489 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 14:29:19.191505 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 14:29:19.191521 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 14:29:19.191536 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 14:29:19.191556 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 14:29:19.191572 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 14:29:19.191587 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 14:29:19.191603 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 14:29:19.191632 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 14:29:19.191648 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 14:29:19.191663 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 14:29:19.191679 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 14:29:19.191695 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 14:29:19.191715 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 14:29:19.191731 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 14:29:19.191755 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:29:19.191770 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:29:19.191787 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:29:19.191803 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 14:29:19.191818 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 14:29:19.191843 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 14:29:19.191865 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 14:29:19.191888 kernel: NODE_DATA(0) allocated [mem 0x21fff8000-0x21fffdfff] Dec 13 14:29:19.191909 kernel: Zone ranges: Dec 13 14:29:19.191923 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:29:19.191938 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:29:19.191952 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:29:19.191966 kernel: Movable zone start for each node Dec 13 14:29:19.191981 kernel: Early memory node ranges Dec 13 14:29:19.191995 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 14:29:19.192010 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 14:29:19.192030 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 14:29:19.192046 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 14:29:19.192062 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 14:29:19.192078 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:29:19.192096 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 14:29:19.192113 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:29:19.192129 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 14:29:19.192146 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 14:29:19.192163 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 14:29:19.192184 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 14:29:19.192201 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 14:29:19.192218 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:29:19.192235 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:29:19.192252 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:29:19.192268 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:29:19.192286 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:29:19.192303 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:29:19.192319 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:29:19.192339 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:29:19.192356 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:29:19.192372 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:29:19.192389 kernel: Booting paravirtualized kernel on KVM Dec 13 14:29:19.192406 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:29:19.192423 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:29:19.192440 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:29:19.192457 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:29:19.192473 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:29:19.192493 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:29:19.192510 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:29:19.192526 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 14:29:19.192542 kernel: Policy zone: Normal Dec 13 14:29:19.192561 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:29:19.192578 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:29:19.192594 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:29:19.192626 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:29:19.192642 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:29:19.192664 kernel: Memory: 7515400K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 344884K reserved, 0K cma-reserved) Dec 13 14:29:19.192681 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:29:19.192697 kernel: Kernel/User page tables isolation: enabled Dec 13 14:29:19.192714 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:29:19.192731 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:29:19.192747 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:29:19.192765 kernel: rcu: RCU event tracing is enabled. Dec 13 14:29:19.192782 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:29:19.192803 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:29:19.192834 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:29:19.192852 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:29:19.192873 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:29:19.192891 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:29:19.192915 kernel: Console: colour dummy device 80x25 Dec 13 14:29:19.192933 kernel: printk: console [ttyS0] enabled Dec 13 14:29:19.192950 kernel: ACPI: Core revision 20210730 Dec 13 14:29:19.192967 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:29:19.192981 kernel: x2apic enabled Dec 13 14:29:19.192999 kernel: Switched APIC routing to physical x2apic. Dec 13 14:29:19.193015 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 14:29:19.193032 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:29:19.193049 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 14:29:19.193067 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 14:29:19.193084 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 14:29:19.193101 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:29:19.193123 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:29:19.193140 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:29:19.193156 kernel: Spectre V2 : Mitigation: IBRS Dec 13 14:29:19.193173 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:29:19.193189 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:29:19.193205 kernel: RETBleed: Mitigation: IBRS Dec 13 14:29:19.193221 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:29:19.193237 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 14:29:19.193253 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:29:19.193275 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 14:29:19.193293 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:29:19.193311 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:29:19.193328 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:29:19.193346 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:29:19.193364 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:29:19.193383 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:29:19.193400 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:29:19.193418 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:29:19.193440 kernel: LSM: Security Framework initializing Dec 13 14:29:19.193458 kernel: SELinux: Initializing. Dec 13 14:29:19.193476 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:29:19.193492 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:29:19.193509 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 14:29:19.193524 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 14:29:19.193542 kernel: signal: max sigframe size: 1776 Dec 13 14:29:19.193560 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:29:19.193578 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:29:19.193601 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:29:19.193633 kernel: x86: Booting SMP configuration: Dec 13 14:29:19.193651 kernel: .... node #0, CPUs: #1 Dec 13 14:29:19.193669 kernel: kvm-clock: cpu 1, msr 4719a041, secondary cpu clock Dec 13 14:29:19.193687 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:29:19.193707 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:29:19.193725 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:29:19.193743 kernel: smpboot: Max logical packages: 1 Dec 13 14:29:19.193766 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 14:29:19.193785 kernel: devtmpfs: initialized Dec 13 14:29:19.193803 kernel: x86/mm: Memory block size: 128MB Dec 13 14:29:19.193821 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 14:29:19.193839 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:29:19.193857 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:29:19.193875 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:29:19.193901 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:29:19.193920 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:29:19.193942 kernel: audit: type=2000 audit(1734100157.919:1): state=initialized audit_enabled=0 res=1 Dec 13 14:29:19.193959 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:29:19.193977 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:29:19.193995 kernel: cpuidle: using governor menu Dec 13 14:29:19.194013 kernel: ACPI: bus type PCI registered Dec 13 14:29:19.194031 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:29:19.194049 kernel: dca service started, version 1.12.1 Dec 13 14:29:19.194068 kernel: PCI: Using configuration type 1 for base access Dec 13 14:29:19.194086 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:29:19.194108 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:29:19.194126 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:29:19.194144 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:29:19.194161 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:29:19.194179 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:29:19.194197 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:29:19.194214 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:29:19.194232 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:29:19.194250 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:29:19.194272 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:29:19.194290 kernel: ACPI: Interpreter enabled Dec 13 14:29:19.194308 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:29:19.194326 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:29:19.194345 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:29:19.194362 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:29:19.194380 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:29:19.200462 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:29:19.200733 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:29:19.200760 kernel: PCI host bridge to bus 0000:00 Dec 13 14:29:19.200950 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:29:19.201104 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:29:19.201251 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:29:19.201401 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 14:29:19.201546 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:29:19.201757 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:29:19.201949 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 14:29:19.202129 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:29:19.202297 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:29:19.202476 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 14:29:19.202969 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 14:29:19.203557 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 14:29:19.209180 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:29:19.209371 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 14:29:19.209538 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 14:29:19.210142 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:29:19.210596 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 14:29:19.210987 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 14:29:19.211017 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:29:19.211035 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:29:19.211052 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:29:19.211069 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:29:19.211086 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:29:19.211103 kernel: iommu: Default domain type: Translated Dec 13 14:29:19.211119 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:29:19.211136 kernel: vgaarb: loaded Dec 13 14:29:19.211153 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:29:19.211174 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:29:19.211191 kernel: PTP clock support registered Dec 13 14:29:19.211208 kernel: Registered efivars operations Dec 13 14:29:19.211224 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:29:19.211241 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:29:19.211257 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 14:29:19.211274 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 14:29:19.211290 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 14:29:19.211306 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 14:29:19.211326 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 14:29:19.211342 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:29:19.211359 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:29:19.211377 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:29:19.211393 kernel: pnp: PnP ACPI init Dec 13 14:29:19.211410 kernel: pnp: PnP ACPI: found 7 devices Dec 13 14:29:19.211426 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:29:19.211443 kernel: NET: Registered PF_INET protocol family Dec 13 14:29:19.211459 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:29:19.211480 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:29:19.211496 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:29:19.211513 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:29:19.211530 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:29:19.211546 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:29:19.211563 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:29:19.211579 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:29:19.211596 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:29:19.211659 kernel: NET: Registered PF_XDP protocol family Dec 13 14:29:19.211826 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:29:19.212019 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:29:19.212168 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:29:19.212313 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 14:29:19.212478 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:29:19.212502 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:29:19.212526 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:29:19.212544 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 14:29:19.212563 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:29:19.212581 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:29:19.212599 kernel: clocksource: Switched to clocksource tsc Dec 13 14:29:19.212640 kernel: Initialise system trusted keyrings Dec 13 14:29:19.212658 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:29:19.212676 kernel: Key type asymmetric registered Dec 13 14:29:19.212694 kernel: Asymmetric key parser 'x509' registered Dec 13 14:29:19.212718 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:29:19.212736 kernel: io scheduler mq-deadline registered Dec 13 14:29:19.212754 kernel: io scheduler kyber registered Dec 13 14:29:19.212772 kernel: io scheduler bfq registered Dec 13 14:29:19.212790 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:29:19.212809 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:29:19.212989 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 14:29:19.213012 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 14:29:19.213177 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 14:29:19.213206 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:29:19.213370 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 14:29:19.213393 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:29:19.213412 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:29:19.213431 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:29:19.213449 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 14:29:19.213467 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 14:29:19.229201 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 14:29:19.229266 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:29:19.229285 kernel: i8042: Warning: Keylock active Dec 13 14:29:19.229302 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:29:19.229319 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:29:19.229511 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:29:19.229701 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:29:19.229868 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:29:18 UTC (1734100158) Dec 13 14:29:19.230054 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:29:19.230085 kernel: intel_pstate: CPU model not supported Dec 13 14:29:19.230105 kernel: pstore: Registered efi as persistent store backend Dec 13 14:29:19.230132 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:29:19.230150 kernel: Segment Routing with IPv6 Dec 13 14:29:19.230168 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:29:19.230185 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:29:19.230202 kernel: Key type dns_resolver registered Dec 13 14:29:19.230228 kernel: IPI shorthand broadcast: enabled Dec 13 14:29:19.230246 kernel: sched_clock: Marking stable (787276380, 167540767)->(979800765, -24983618) Dec 13 14:29:19.230268 kernel: registered taskstats version 1 Dec 13 14:29:19.230294 kernel: Loading compiled-in X.509 certificates Dec 13 14:29:19.230313 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:29:19.230330 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:29:19.230347 kernel: Key type .fscrypt registered Dec 13 14:29:19.230371 kernel: Key type fscrypt-provisioning registered Dec 13 14:29:19.230390 kernel: pstore: Using crash dump compression: deflate Dec 13 14:29:19.230408 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:29:19.230425 kernel: ima: No architecture policies found Dec 13 14:29:19.230447 kernel: clk: Disabling unused clocks Dec 13 14:29:19.230465 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:29:19.230483 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:29:19.230501 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:29:19.230519 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:29:19.230537 kernel: Run /init as init process Dec 13 14:29:19.230554 kernel: with arguments: Dec 13 14:29:19.230571 kernel: /init Dec 13 14:29:19.230595 kernel: with environment: Dec 13 14:29:19.235254 kernel: HOME=/ Dec 13 14:29:19.235276 kernel: TERM=linux Dec 13 14:29:19.235296 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:29:19.235320 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:29:19.235343 systemd[1]: Detected virtualization kvm. Dec 13 14:29:19.235361 systemd[1]: Detected architecture x86-64. Dec 13 14:29:19.235377 systemd[1]: Running in initrd. Dec 13 14:29:19.235401 systemd[1]: No hostname configured, using default hostname. Dec 13 14:29:19.235418 systemd[1]: Hostname set to . Dec 13 14:29:19.235439 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:29:19.235460 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:29:19.235479 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:29:19.235495 systemd[1]: Reached target cryptsetup.target. Dec 13 14:29:19.235511 systemd[1]: Reached target paths.target. Dec 13 14:29:19.235528 systemd[1]: Reached target slices.target. Dec 13 14:29:19.235550 systemd[1]: Reached target swap.target. Dec 13 14:29:19.235568 systemd[1]: Reached target timers.target. Dec 13 14:29:19.235587 systemd[1]: Listening on iscsid.socket. Dec 13 14:29:19.235621 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:29:19.235642 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:29:19.235660 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:29:19.235677 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:29:19.235694 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:29:19.235716 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:29:19.235735 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:29:19.235774 systemd[1]: Reached target sockets.target. Dec 13 14:29:19.235796 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:29:19.235814 systemd[1]: Finished network-cleanup.service. Dec 13 14:29:19.235833 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:29:19.235856 systemd[1]: Starting systemd-journald.service... Dec 13 14:29:19.235877 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:29:19.235906 systemd[1]: Starting systemd-resolved.service... Dec 13 14:29:19.235926 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:29:19.235946 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:29:19.235967 kernel: audit: type=1130 audit(1734100159.193:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.235988 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:29:19.236006 kernel: audit: type=1130 audit(1734100159.202:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.236023 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:29:19.236044 kernel: audit: type=1130 audit(1734100159.212:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.236063 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:29:19.236082 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:29:19.236111 systemd-journald[189]: Journal started Dec 13 14:29:19.236220 systemd-journald[189]: Runtime Journal (/run/log/journal/8a2ae6c170efcf9e7e2331be7d6dd692) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:29:19.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.207697 systemd-modules-load[190]: Inserted module 'overlay' Dec 13 14:29:19.248638 systemd[1]: Started systemd-journald.service. Dec 13 14:29:19.248712 kernel: audit: type=1130 audit(1734100159.240:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.253312 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:29:19.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.259625 kernel: audit: type=1130 audit(1734100159.252:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.271518 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:29:19.288047 kernel: audit: type=1130 audit(1734100159.275:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.278342 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:29:19.288652 systemd-resolved[191]: Positive Trust Anchors: Dec 13 14:29:19.288801 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:29:19.288864 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:29:19.295045 systemd-resolved[191]: Defaulting to hostname 'linux'. Dec 13 14:29:19.311289 dracut-cmdline[205]: dracut-dracut-053 Dec 13 14:29:19.298373 systemd[1]: Started systemd-resolved.service. Dec 13 14:29:19.319738 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:29:19.319779 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:29:19.331141 systemd-modules-load[190]: Inserted module 'br_netfilter' Dec 13 14:29:19.344775 kernel: Bridge firewalling registered Dec 13 14:29:19.344822 kernel: audit: type=1130 audit(1734100159.331:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.333032 systemd[1]: Reached target nss-lookup.target. Dec 13 14:29:19.368648 kernel: SCSI subsystem initialized Dec 13 14:29:19.388310 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:29:19.388416 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:29:19.391634 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:29:19.396157 systemd-modules-load[190]: Inserted module 'dm_multipath' Dec 13 14:29:19.398147 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:29:19.416017 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:29:19.416108 kernel: audit: type=1130 audit(1734100159.407:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.410335 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:29:19.429484 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:29:19.439798 kernel: audit: type=1130 audit(1734100159.431:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.445647 kernel: iscsi: registered transport (tcp) Dec 13 14:29:19.473459 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:29:19.473577 kernel: QLogic iSCSI HBA Driver Dec 13 14:29:19.519787 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:29:19.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.526431 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:29:19.585682 kernel: raid6: avx2x4 gen() 23173 MB/s Dec 13 14:29:19.603654 kernel: raid6: avx2x4 xor() 6383 MB/s Dec 13 14:29:19.620653 kernel: raid6: avx2x2 gen() 23860 MB/s Dec 13 14:29:19.637655 kernel: raid6: avx2x2 xor() 18547 MB/s Dec 13 14:29:19.654651 kernel: raid6: avx2x1 gen() 21309 MB/s Dec 13 14:29:19.672655 kernel: raid6: avx2x1 xor() 16182 MB/s Dec 13 14:29:19.689647 kernel: raid6: sse2x4 gen() 10354 MB/s Dec 13 14:29:19.706649 kernel: raid6: sse2x4 xor() 6292 MB/s Dec 13 14:29:19.724682 kernel: raid6: sse2x2 gen() 10970 MB/s Dec 13 14:29:19.741662 kernel: raid6: sse2x2 xor() 7406 MB/s Dec 13 14:29:19.758659 kernel: raid6: sse2x1 gen() 9723 MB/s Dec 13 14:29:19.776753 kernel: raid6: sse2x1 xor() 5195 MB/s Dec 13 14:29:19.776798 kernel: raid6: using algorithm avx2x2 gen() 23860 MB/s Dec 13 14:29:19.776821 kernel: raid6: .... xor() 18547 MB/s, rmw enabled Dec 13 14:29:19.777917 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:29:19.793654 kernel: xor: automatically using best checksumming function avx Dec 13 14:29:19.906655 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:29:19.919220 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:29:19.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.922000 audit: BPF prog-id=7 op=LOAD Dec 13 14:29:19.922000 audit: BPF prog-id=8 op=LOAD Dec 13 14:29:19.924695 systemd[1]: Starting systemd-udevd.service... Dec 13 14:29:19.942434 systemd-udevd[388]: Using default interface naming scheme 'v252'. Dec 13 14:29:19.949745 systemd[1]: Started systemd-udevd.service. Dec 13 14:29:19.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:19.956258 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:29:19.979336 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Dec 13 14:29:20.022019 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:29:20.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:20.023657 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:29:20.093355 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:29:20.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:20.186125 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:29:20.236655 kernel: scsi host0: Virtio SCSI HBA Dec 13 14:29:20.272960 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:29:20.293554 kernel: AES CTR mode by8 optimization enabled Dec 13 14:29:20.293697 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 14:29:20.361626 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 14:29:20.418290 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 14:29:20.418490 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 14:29:20.418665 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 14:29:20.418825 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 14:29:20.418963 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:29:20.418992 kernel: GPT:17805311 != 25165823 Dec 13 14:29:20.419006 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:29:20.419019 kernel: GPT:17805311 != 25165823 Dec 13 14:29:20.419033 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:29:20.419046 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:29:20.419064 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 14:29:20.470635 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (437) Dec 13 14:29:20.478075 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:29:20.509249 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:29:20.514564 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:29:20.529465 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:29:20.542020 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:29:20.570419 systemd[1]: Starting disk-uuid.service... Dec 13 14:29:20.600195 disk-uuid[518]: Primary Header is updated. Dec 13 14:29:20.600195 disk-uuid[518]: Secondary Entries is updated. Dec 13 14:29:20.600195 disk-uuid[518]: Secondary Header is updated. Dec 13 14:29:20.627758 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:29:20.627799 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:29:20.640659 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:29:21.653637 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:29:21.654780 disk-uuid[519]: The operation has completed successfully. Dec 13 14:29:21.723037 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:29:21.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:21.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:21.723187 systemd[1]: Finished disk-uuid.service. Dec 13 14:29:21.742530 systemd[1]: Starting verity-setup.service... Dec 13 14:29:21.771645 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:29:21.852554 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:29:21.863814 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:29:21.875192 systemd[1]: Finished verity-setup.service. Dec 13 14:29:21.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:21.970155 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:29:21.970043 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:29:21.977101 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:29:21.978398 systemd[1]: Starting ignition-setup.service... Dec 13 14:29:22.035960 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:29:22.036019 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:29:22.036043 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:29:22.036066 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:29:22.024114 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:29:22.055268 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:29:22.076062 systemd[1]: Finished ignition-setup.service. Dec 13 14:29:22.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.087501 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:29:22.138560 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:29:22.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.146000 audit: BPF prog-id=9 op=LOAD Dec 13 14:29:22.149225 systemd[1]: Starting systemd-networkd.service... Dec 13 14:29:22.184993 systemd-networkd[694]: lo: Link UP Dec 13 14:29:22.185009 systemd-networkd[694]: lo: Gained carrier Dec 13 14:29:22.186037 systemd-networkd[694]: Enumeration completed Dec 13 14:29:22.186445 systemd-networkd[694]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:29:22.186721 systemd[1]: Started systemd-networkd.service. Dec 13 14:29:22.189447 systemd-networkd[694]: eth0: Link UP Dec 13 14:29:22.189455 systemd-networkd[694]: eth0: Gained carrier Dec 13 14:29:22.198762 systemd-networkd[694]: eth0: DHCPv4 address 10.128.0.53/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:29:22.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.247975 systemd[1]: Reached target network.target. Dec 13 14:29:22.258441 systemd[1]: Starting iscsiuio.service... Dec 13 14:29:22.283980 systemd[1]: Started iscsiuio.service. Dec 13 14:29:22.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.299729 systemd[1]: Starting iscsid.service... Dec 13 14:29:22.319939 iscsid[704]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:29:22.319939 iscsid[704]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:29:22.319939 iscsid[704]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:29:22.319939 iscsid[704]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:29:22.319939 iscsid[704]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:29:22.319939 iscsid[704]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:29:22.319939 iscsid[704]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:29:22.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.312936 systemd[1]: Started iscsid.service. Dec 13 14:29:22.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.359109 ignition[644]: Ignition 2.14.0 Dec 13 14:29:22.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.328560 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:29:22.359126 ignition[644]: Stage: fetch-offline Dec 13 14:29:22.373161 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:29:22.359227 ignition[644]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:29:22.382003 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:29:22.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.359273 ignition[644]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:29:22.390878 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:29:22.381537 ignition[644]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:29:22.426883 systemd[1]: Reached target remote-fs.target. Dec 13 14:29:22.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.381900 ignition[644]: parsed url from cmdline: "" Dec 13 14:29:22.438426 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:29:22.381909 ignition[644]: no config URL provided Dec 13 14:29:22.455269 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:29:22.381921 ignition[644]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:29:22.480241 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:29:22.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.381940 ignition[644]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:29:22.497406 systemd[1]: Starting ignition-fetch.service... Dec 13 14:29:22.381955 ignition[644]: failed to fetch config: resource requires networking Dec 13 14:29:22.530592 unknown[719]: fetched base config from "system" Dec 13 14:29:22.382649 ignition[644]: Ignition finished successfully Dec 13 14:29:22.530624 unknown[719]: fetched base config from "system" Dec 13 14:29:22.510195 ignition[719]: Ignition 2.14.0 Dec 13 14:29:22.530636 unknown[719]: fetched user config from "gcp" Dec 13 14:29:22.510204 ignition[719]: Stage: fetch Dec 13 14:29:22.534283 systemd[1]: Finished ignition-fetch.service. Dec 13 14:29:22.510339 ignition[719]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:29:22.550431 systemd[1]: Starting ignition-kargs.service... Dec 13 14:29:22.510374 ignition[719]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:29:22.575346 systemd[1]: Finished ignition-kargs.service. Dec 13 14:29:22.518448 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:29:22.592520 systemd[1]: Starting ignition-disks.service... Dec 13 14:29:22.518659 ignition[719]: parsed url from cmdline: "" Dec 13 14:29:22.630220 systemd[1]: Finished ignition-disks.service. Dec 13 14:29:22.518664 ignition[719]: no config URL provided Dec 13 14:29:22.648142 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:29:22.518671 ignition[719]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:29:22.662766 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:29:22.518683 ignition[719]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:29:22.676766 systemd[1]: Reached target local-fs.target. Dec 13 14:29:22.518729 ignition[719]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 14:29:22.690820 systemd[1]: Reached target sysinit.target. Dec 13 14:29:22.525219 ignition[719]: GET result: OK Dec 13 14:29:22.705850 systemd[1]: Reached target basic.target. Dec 13 14:29:22.525327 ignition[719]: parsing config with SHA512: 7c02356dbdf9ceaec9396a58d0c8fa6d8b66026b9238a2c53846a9e360ef84e6bed2e4551649c50db054664ff629a9970dd202bd03f468ef9f8061e84de08dc0 Dec 13 14:29:22.707449 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:29:22.532448 ignition[719]: fetch: fetch complete Dec 13 14:29:22.532466 ignition[719]: fetch: fetch passed Dec 13 14:29:22.532550 ignition[719]: Ignition finished successfully Dec 13 14:29:22.564483 ignition[725]: Ignition 2.14.0 Dec 13 14:29:22.564491 ignition[725]: Stage: kargs Dec 13 14:29:22.564649 ignition[725]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:29:22.564687 ignition[725]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:29:22.572380 ignition[725]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:29:22.574008 ignition[725]: kargs: kargs passed Dec 13 14:29:22.574069 ignition[725]: Ignition finished successfully Dec 13 14:29:22.605665 ignition[731]: Ignition 2.14.0 Dec 13 14:29:22.605674 ignition[731]: Stage: disks Dec 13 14:29:22.605824 ignition[731]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:29:22.605856 ignition[731]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:29:22.613305 ignition[731]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:29:22.614867 ignition[731]: disks: disks passed Dec 13 14:29:22.614921 ignition[731]: Ignition finished successfully Dec 13 14:29:22.752187 systemd-fsck[739]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:29:22.949761 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:29:22.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:22.951414 systemd[1]: Mounting sysroot.mount... Dec 13 14:29:22.980962 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:29:22.989143 systemd[1]: Mounted sysroot.mount. Dec 13 14:29:22.995949 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:29:23.016902 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:29:23.034308 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:29:23.034395 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:29:23.034460 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:29:23.056570 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:29:23.081585 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:29:23.133834 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (745) Dec 13 14:29:23.133889 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:29:23.133915 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:29:23.133939 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:29:23.126473 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:29:23.149789 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:29:23.149967 initrd-setup-root[766]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:29:23.160796 initrd-setup-root[776]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:29:23.170765 initrd-setup-root[784]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:29:23.181785 initrd-setup-root[792]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:29:23.191550 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:29:23.233905 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:29:23.274913 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:29:23.274974 kernel: audit: type=1130 audit(1734100163.232:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:23.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:23.235667 systemd[1]: Starting ignition-mount.service... Dec 13 14:29:23.283127 systemd[1]: Starting sysroot-boot.service... Dec 13 14:29:23.298263 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:29:23.298429 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:29:23.332909 ignition[811]: INFO : Ignition 2.14.0 Dec 13 14:29:23.332909 ignition[811]: INFO : Stage: mount Dec 13 14:29:23.332909 ignition[811]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:29:23.332909 ignition[811]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:29:23.332909 ignition[811]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:29:23.332909 ignition[811]: INFO : mount: mount passed Dec 13 14:29:23.332909 ignition[811]: INFO : Ignition finished successfully Dec 13 14:29:23.509789 kernel: audit: type=1130 audit(1734100163.339:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:23.509841 kernel: audit: type=1130 audit(1734100163.366:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:23.509868 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (820) Dec 13 14:29:23.509902 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:29:23.509926 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:29:23.509947 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:29:23.509969 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:29:23.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:23.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:23.329031 systemd[1]: Finished sysroot-boot.service. Dec 13 14:29:23.341188 systemd[1]: Finished ignition-mount.service. Dec 13 14:29:23.369858 systemd[1]: Starting ignition-files.service... Dec 13 14:29:23.411170 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:29:23.551214 ignition[839]: INFO : Ignition 2.14.0 Dec 13 14:29:23.551214 ignition[839]: INFO : Stage: files Dec 13 14:29:23.551214 ignition[839]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:29:23.551214 ignition[839]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:29:23.551214 ignition[839]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:29:23.551214 ignition[839]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:29:23.551214 ignition[839]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:29:23.551214 ignition[839]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:29:23.551214 ignition[839]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:29:23.551214 ignition[839]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:29:23.551214 ignition[839]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:29:23.551214 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 14:29:23.551214 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:29:23.551214 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1441042652" Dec 13 14:29:23.551214 ignition[839]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1441042652": device or resource busy Dec 13 14:29:23.551214 ignition[839]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1441042652", trying btrfs: device or resource busy Dec 13 14:29:23.551214 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1441042652" Dec 13 14:29:23.782800 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (841) Dec 13 14:29:23.479143 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:29:23.791828 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1441042652" Dec 13 14:29:23.791828 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem1441042652" Dec 13 14:29:23.791828 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem1441042652" Dec 13 14:29:23.791828 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 14:29:23.791828 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:29:23.791828 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:29:23.791828 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Dec 13 14:29:23.530098 unknown[839]: wrote ssh authorized keys file for user: core Dec 13 14:29:24.047314 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:29:24.047314 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3416923320" Dec 13 14:29:24.079792 ignition[839]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3416923320": device or resource busy Dec 13 14:29:24.079792 ignition[839]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3416923320", trying btrfs: device or resource busy Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3416923320" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3416923320" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem3416923320" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem3416923320" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:29:24.079792 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:29:24.056889 systemd-networkd[694]: eth0: Gained IPv6LL Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem819417579" Dec 13 14:29:24.331783 ignition[839]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem819417579": device or resource busy Dec 13 14:29:24.331783 ignition[839]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem819417579", trying btrfs: device or resource busy Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem819417579" Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem819417579" Dec 13 14:29:24.331783 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem819417579" Dec 13 14:29:24.066792 systemd[1]: mnt-oem3416923320.mount: Deactivated successfully. Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem819417579" Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem474683778" Dec 13 14:29:24.584883 ignition[839]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem474683778": device or resource busy Dec 13 14:29:24.584883 ignition[839]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem474683778", trying btrfs: device or resource busy Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem474683778" Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem474683778" Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem474683778" Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem474683778" Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:29:24.584883 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:29:24.092229 systemd[1]: mnt-oem819417579.mount: Deactivated successfully. Dec 13 14:29:24.844839 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK Dec 13 14:29:24.912025 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:29:24.912025 ignition[839]: INFO : files: op(1b): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:29:24.912025 ignition[839]: INFO : files: op(1b): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:29:24.912025 ignition[839]: INFO : files: op(1c): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:29:25.006819 kernel: audit: type=1130 audit(1734100164.929:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:24.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(1c): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(1d): [started] processing unit "oem-gce.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(1d): [finished] processing unit "oem-gce.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(20): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(20): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(21): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(21): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:29:25.006985 ignition[839]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:29:25.006985 ignition[839]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:29:25.006985 ignition[839]: INFO : files: files passed Dec 13 14:29:25.006985 ignition[839]: INFO : Ignition finished successfully Dec 13 14:29:25.470849 kernel: audit: type=1130 audit(1734100165.015:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.470916 kernel: audit: type=1130 audit(1734100165.066:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.470938 kernel: audit: type=1131 audit(1734100165.066:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.470954 kernel: audit: type=1130 audit(1734100165.157:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.470974 kernel: audit: type=1131 audit(1734100165.157:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.470989 kernel: audit: type=1130 audit(1734100165.299:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:24.922700 systemd[1]: Finished ignition-files.service. Dec 13 14:29:24.941644 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:29:25.503826 initrd-setup-root-after-ignition[862]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:29:24.976833 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:29:24.978221 systemd[1]: Starting ignition-quench.service... Dec 13 14:29:24.991327 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:29:25.017459 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:29:25.017685 systemd[1]: Finished ignition-quench.service. Dec 13 14:29:25.068189 systemd[1]: Reached target ignition-complete.target. Dec 13 14:29:25.120453 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:29:25.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.152292 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:29:25.152624 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:29:25.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.159203 systemd[1]: Reached target initrd-fs.target. Dec 13 14:29:25.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.237995 systemd[1]: Reached target initrd.target. Dec 13 14:29:25.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.252170 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:29:25.717828 ignition[877]: INFO : Ignition 2.14.0 Dec 13 14:29:25.717828 ignition[877]: INFO : Stage: umount Dec 13 14:29:25.717828 ignition[877]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:29:25.717828 ignition[877]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:29:25.253878 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:29:25.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.799930 ignition[877]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:29:25.799930 ignition[877]: INFO : umount: umount passed Dec 13 14:29:25.799930 ignition[877]: INFO : Ignition finished successfully Dec 13 14:29:25.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.847006 iscsid[704]: iscsid shutting down. Dec 13 14:29:25.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.279167 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:29:25.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.302665 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:29:25.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.345143 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:29:25.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.352154 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:29:25.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.389301 systemd[1]: Stopped target timers.target. Dec 13 14:29:25.402290 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:29:25.402561 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:29:25.423458 systemd[1]: Stopped target initrd.target. Dec 13 14:29:25.444251 systemd[1]: Stopped target basic.target. Dec 13 14:29:25.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.457249 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:29:26.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.479125 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:29:25.494115 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:29:26.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.512121 systemd[1]: Stopped target remote-fs.target. Dec 13 14:29:26.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:26.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.534137 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:29:25.559159 systemd[1]: Stopped target sysinit.target. Dec 13 14:29:25.574125 systemd[1]: Stopped target local-fs.target. Dec 13 14:29:25.590150 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:29:25.606148 systemd[1]: Stopped target swap.target. Dec 13 14:29:26.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.620068 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:29:26.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:26.140000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:29:25.620297 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:29:25.636267 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:29:25.652093 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:29:26.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.652313 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:29:26.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.660269 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:29:26.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.660483 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:29:25.684188 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:29:26.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.684377 systemd[1]: Stopped ignition-files.service. Dec 13 14:29:25.700929 systemd[1]: Stopping ignition-mount.service... Dec 13 14:29:25.734191 systemd[1]: Stopping iscsid.service... Dec 13 14:29:26.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.742799 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:29:26.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.763907 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:29:26.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.764171 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:29:25.792279 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:29:25.792531 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:29:26.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.812487 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:29:26.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.813921 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:29:26.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.814069 systemd[1]: Stopped iscsid.service. Dec 13 14:29:26.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.819664 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:29:26.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:26.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:25.819783 systemd[1]: Stopped ignition-mount.service. Dec 13 14:29:25.832692 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:29:25.832828 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:29:25.854856 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:29:25.855044 systemd[1]: Stopped ignition-disks.service. Dec 13 14:29:25.869036 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:29:25.869123 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:29:26.519093 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Dec 13 14:29:25.883958 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:29:25.884051 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:29:25.899051 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:29:25.899137 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:29:25.914021 systemd[1]: Stopped target paths.target. Dec 13 14:29:25.928908 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:29:25.933731 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:29:25.943825 systemd[1]: Stopped target slices.target. Dec 13 14:29:25.957798 systemd[1]: Stopped target sockets.target. Dec 13 14:29:25.957979 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:29:25.958041 systemd[1]: Closed iscsid.socket. Dec 13 14:29:25.977889 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:29:25.978004 systemd[1]: Stopped ignition-setup.service. Dec 13 14:29:25.992917 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:29:25.993006 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:29:26.008078 systemd[1]: Stopping iscsiuio.service... Dec 13 14:29:26.023401 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:29:26.023538 systemd[1]: Stopped iscsiuio.service. Dec 13 14:29:26.031381 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:29:26.031520 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:29:26.054105 systemd[1]: Stopped target network.target. Dec 13 14:29:26.067831 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:29:26.067925 systemd[1]: Closed iscsiuio.socket. Dec 13 14:29:26.083060 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:29:26.086723 systemd-networkd[694]: eth0: DHCPv6 lease lost Dec 13 14:29:26.097078 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:29:26.112169 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:29:26.112314 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:29:26.127714 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:29:26.127867 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:29:26.142705 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:29:26.142769 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:29:26.159538 systemd[1]: Stopping network-cleanup.service... Dec 13 14:29:26.171802 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:29:26.171960 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:29:26.186992 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:29:26.187081 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:29:26.203104 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:29:26.203187 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:29:26.218170 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:29:26.236744 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:29:26.237521 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:29:26.237751 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:29:26.252950 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:29:26.253058 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:29:26.266959 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:29:26.267026 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:29:26.281906 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:29:26.282019 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:29:26.296978 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:29:26.297071 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:29:26.311965 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:29:26.312053 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:29:26.328381 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:29:26.353796 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:29:26.353953 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:29:26.372231 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:29:26.372387 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:29:26.387027 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:29:26.387127 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:29:26.404572 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:29:26.405322 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:29:26.529000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:29:26.405457 systemd[1]: Stopped network-cleanup.service. Dec 13 14:29:26.419249 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:29:26.419374 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:29:26.434286 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:29:26.451183 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:29:26.481547 systemd[1]: Switching root. Dec 13 14:29:26.530984 systemd-journald[189]: Journal stopped Dec 13 14:29:31.270832 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:29:31.270965 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:29:31.271000 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:29:31.271024 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:29:31.271051 kernel: SELinux: policy capability open_perms=1 Dec 13 14:29:31.271073 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:29:31.271096 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:29:31.271118 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:29:31.271141 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:29:31.271164 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:29:31.271187 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:29:31.271211 systemd[1]: Successfully loaded SELinux policy in 110.196ms. Dec 13 14:29:31.271263 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.045ms. Dec 13 14:29:31.271293 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:29:31.271318 systemd[1]: Detected virtualization kvm. Dec 13 14:29:31.271349 systemd[1]: Detected architecture x86-64. Dec 13 14:29:31.271372 systemd[1]: Detected first boot. Dec 13 14:29:31.271396 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:29:31.271421 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:29:31.271444 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:29:31.271473 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:29:31.271510 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:29:31.271537 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:29:31.271568 kernel: kauditd_printk_skb: 52 callbacks suppressed Dec 13 14:29:31.271591 kernel: audit: type=1334 audit(1734100170.334:89): prog-id=12 op=LOAD Dec 13 14:29:31.271627 kernel: audit: type=1334 audit(1734100170.334:90): prog-id=3 op=UNLOAD Dec 13 14:29:31.271650 kernel: audit: type=1334 audit(1734100170.346:91): prog-id=13 op=LOAD Dec 13 14:29:31.271671 kernel: audit: type=1334 audit(1734100170.360:92): prog-id=14 op=LOAD Dec 13 14:29:31.271699 kernel: audit: type=1334 audit(1734100170.360:93): prog-id=4 op=UNLOAD Dec 13 14:29:31.271722 kernel: audit: type=1334 audit(1734100170.360:94): prog-id=5 op=UNLOAD Dec 13 14:29:31.271744 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:29:31.271768 kernel: audit: type=1131 audit(1734100170.362:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.271791 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:29:31.271815 kernel: audit: type=1334 audit(1734100170.417:96): prog-id=12 op=UNLOAD Dec 13 14:29:31.271839 kernel: audit: type=1130 audit(1734100170.433:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.271862 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:29:31.271890 kernel: audit: type=1131 audit(1734100170.433:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.271913 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:29:31.271937 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:29:31.271962 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:29:31.271986 systemd[1]: Created slice system-getty.slice. Dec 13 14:29:31.272009 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:29:31.272034 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:29:31.272062 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:29:31.272088 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:29:31.272113 systemd[1]: Created slice user.slice. Dec 13 14:29:31.272136 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:29:31.272160 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:29:31.272184 systemd[1]: Set up automount boot.automount. Dec 13 14:29:31.272208 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:29:31.272231 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:29:31.272260 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:29:31.272566 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:29:31.272653 systemd[1]: Reached target integritysetup.target. Dec 13 14:29:31.272677 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:29:31.272699 systemd[1]: Reached target remote-fs.target. Dec 13 14:29:31.272722 systemd[1]: Reached target slices.target. Dec 13 14:29:31.272744 systemd[1]: Reached target swap.target. Dec 13 14:29:31.272766 systemd[1]: Reached target torcx.target. Dec 13 14:29:31.272788 systemd[1]: Reached target veritysetup.target. Dec 13 14:29:31.272820 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:29:31.272844 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:29:31.272872 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:29:31.272895 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:29:31.272918 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:29:31.272940 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:29:31.272963 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:29:31.272985 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:29:31.273019 systemd[1]: Mounting media.mount... Dec 13 14:29:31.273042 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:31.273067 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:29:31.273096 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:29:31.273119 systemd[1]: Mounting tmp.mount... Dec 13 14:29:31.273140 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:29:31.273164 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:29:31.273181 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:29:31.273196 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:29:31.273211 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:29:31.273227 systemd[1]: Starting modprobe@drm.service... Dec 13 14:29:31.273242 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:29:31.273265 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:29:31.273280 systemd[1]: Starting modprobe@loop.service... Dec 13 14:29:31.273296 kernel: fuse: init (API version 7.34) Dec 13 14:29:31.273312 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:29:31.273327 kernel: loop: module loaded Dec 13 14:29:31.273342 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:29:31.273357 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:29:31.273372 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:29:31.273387 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:29:31.273405 systemd[1]: Stopped systemd-journald.service. Dec 13 14:29:31.273420 systemd[1]: Starting systemd-journald.service... Dec 13 14:29:31.273436 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:29:31.273451 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:29:31.273472 systemd-journald[1000]: Journal started Dec 13 14:29:31.273564 systemd-journald[1000]: Runtime Journal (/run/log/journal/8a2ae6c170efcf9e7e2331be7d6dd692) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:29:26.807000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:29:26.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:29:26.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:29:26.958000 audit: BPF prog-id=10 op=LOAD Dec 13 14:29:26.958000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:29:26.958000 audit: BPF prog-id=11 op=LOAD Dec 13 14:29:26.958000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:29:27.116000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:29:27.116000 audit[910]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:27.116000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:29:27.127000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:29:27.127000 audit[910]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:27.127000 audit: CWD cwd="/" Dec 13 14:29:27.127000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:27.127000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:27.127000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:29:30.334000 audit: BPF prog-id=12 op=LOAD Dec 13 14:29:30.334000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:29:30.346000 audit: BPF prog-id=13 op=LOAD Dec 13 14:29:30.360000 audit: BPF prog-id=14 op=LOAD Dec 13 14:29:30.360000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:29:30.360000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:29:30.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:30.417000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:29:30.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:30.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.228000 audit: BPF prog-id=15 op=LOAD Dec 13 14:29:31.228000 audit: BPF prog-id=16 op=LOAD Dec 13 14:29:31.228000 audit: BPF prog-id=17 op=LOAD Dec 13 14:29:31.228000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:29:31.228000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:29:31.261000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:29:31.261000 audit[1000]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffb5eb68c0 a2=4000 a3=7fffb5eb695c items=0 ppid=1 pid=1000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:31.261000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:29:27.114462 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:29:30.332759 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:29:27.115490 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:29:30.363567 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:29:27.115516 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:29:27.115563 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:29:27.115576 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:29:27.115647 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:29:27.115669 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:29:27.115930 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:29:27.115988 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:29:27.116007 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:29:27.117288 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:29:27.117342 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:29:27.117367 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:29:27.117387 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:29:27.117410 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:29:27.117427 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:29:29.717861 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:29Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:29:29.718228 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:29Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:29:29.718436 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:29Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:29:29.718745 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:29Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:29:29.718816 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:29Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:29:29.718903 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-12-13T14:29:29Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:29:31.288874 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:29:31.304736 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:29:31.320490 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:29:31.320624 systemd[1]: Stopped verity-setup.service. Dec 13 14:29:31.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.343633 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:31.353651 systemd[1]: Started systemd-journald.service. Dec 13 14:29:31.363205 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:29:31.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.371131 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:29:31.378022 systemd[1]: Mounted media.mount. Dec 13 14:29:31.385045 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:29:31.393995 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:29:31.404001 systemd[1]: Mounted tmp.mount. Dec 13 14:29:31.411047 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:29:31.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.420165 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:29:31.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.429178 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:29:31.429417 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:29:31.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.438224 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:29:31.438462 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:29:31.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.447192 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:29:31.447425 systemd[1]: Finished modprobe@drm.service. Dec 13 14:29:31.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.456264 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:29:31.456501 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:29:31.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.465214 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:29:31.465456 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:29:31.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.474200 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:29:31.474428 systemd[1]: Finished modprobe@loop.service. Dec 13 14:29:31.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.483229 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:29:31.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.492213 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:29:31.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.501192 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:29:31.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.510180 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:29:31.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.519656 systemd[1]: Reached target network-pre.target. Dec 13 14:29:31.529515 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:29:31.540403 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:29:31.547756 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:29:31.551319 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:29:31.561038 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:29:31.571769 systemd-journald[1000]: Time spent on flushing to /var/log/journal/8a2ae6c170efcf9e7e2331be7d6dd692 is 77.610ms for 1152 entries. Dec 13 14:29:31.571769 systemd-journald[1000]: System Journal (/var/log/journal/8a2ae6c170efcf9e7e2331be7d6dd692) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:29:31.682129 systemd-journald[1000]: Received client request to flush runtime journal. Dec 13 14:29:31.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.569830 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:29:31.578842 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:29:31.586851 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:29:31.588973 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:29:31.598583 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:29:31.683419 udevadm[1014]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:29:31.607707 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:29:31.618369 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:29:31.626999 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:29:31.636198 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:29:31.645379 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:29:31.657501 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:29:31.670799 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:29:31.681119 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:29:31.693850 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:29:31.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:31.745900 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:29:31.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:32.354167 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:29:32.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:32.362000 audit: BPF prog-id=18 op=LOAD Dec 13 14:29:32.362000 audit: BPF prog-id=19 op=LOAD Dec 13 14:29:32.362000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:29:32.362000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:29:32.365004 systemd[1]: Starting systemd-udevd.service... Dec 13 14:29:32.389994 systemd-udevd[1019]: Using default interface naming scheme 'v252'. Dec 13 14:29:32.433969 systemd[1]: Started systemd-udevd.service. Dec 13 14:29:32.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:32.444000 audit: BPF prog-id=20 op=LOAD Dec 13 14:29:32.447866 systemd[1]: Starting systemd-networkd.service... Dec 13 14:29:32.461000 audit: BPF prog-id=21 op=LOAD Dec 13 14:29:32.461000 audit: BPF prog-id=22 op=LOAD Dec 13 14:29:32.461000 audit: BPF prog-id=23 op=LOAD Dec 13 14:29:32.464482 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:29:32.521733 systemd[1]: Started systemd-userdbd.service. Dec 13 14:29:32.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:32.535249 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:29:32.657692 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:29:32.678602 systemd-networkd[1032]: lo: Link UP Dec 13 14:29:32.679120 systemd-networkd[1032]: lo: Gained carrier Dec 13 14:29:32.680173 systemd-networkd[1032]: Enumeration completed Dec 13 14:29:32.680514 systemd-networkd[1032]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:29:32.680547 systemd[1]: Started systemd-networkd.service. Dec 13 14:29:32.682748 systemd-networkd[1032]: eth0: Link UP Dec 13 14:29:32.682926 systemd-networkd[1032]: eth0: Gained carrier Dec 13 14:29:32.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:32.701471 systemd-networkd[1032]: eth0: DHCPv4 address 10.128.0.53/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:29:32.701785 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1022) Dec 13 14:29:32.726149 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:29:32.733639 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:29:32.750221 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 14:29:32.750348 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:29:32.763000 audit[1021]: AVC avc: denied { confidentiality } for pid=1021 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:29:32.763000 audit[1021]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f2cc26afd0 a1=337fc a2=7f3d60bb9bc5 a3=5 items=110 ppid=1019 pid=1021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:32.763000 audit: CWD cwd="/" Dec 13 14:29:32.763000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=1 name=(null) inode=13727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=2 name=(null) inode=13727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=3 name=(null) inode=13728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=4 name=(null) inode=13727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=5 name=(null) inode=13729 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=6 name=(null) inode=13727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=7 name=(null) inode=13730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=8 name=(null) inode=13730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=9 name=(null) inode=13731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=10 name=(null) inode=13730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=11 name=(null) inode=13732 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=12 name=(null) inode=13730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=13 name=(null) inode=13733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=14 name=(null) inode=13730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=15 name=(null) inode=13734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=16 name=(null) inode=13730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=17 name=(null) inode=13735 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=18 name=(null) inode=13727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=19 name=(null) inode=13736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=20 name=(null) inode=13736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=21 name=(null) inode=13737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=22 name=(null) inode=13736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=23 name=(null) inode=13738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=24 name=(null) inode=13736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=25 name=(null) inode=13739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=26 name=(null) inode=13736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=27 name=(null) inode=13740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=28 name=(null) inode=13736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=29 name=(null) inode=13741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=30 name=(null) inode=13727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=31 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=32 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=33 name=(null) inode=13743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=34 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=35 name=(null) inode=13744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=36 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=37 name=(null) inode=13745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=38 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=39 name=(null) inode=13746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=40 name=(null) inode=13742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=41 name=(null) inode=13747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=42 name=(null) inode=13727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=43 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=44 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=45 name=(null) inode=13749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=46 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=47 name=(null) inode=13750 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=48 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=49 name=(null) inode=13751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=50 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=51 name=(null) inode=13752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=52 name=(null) inode=13748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=53 name=(null) inode=13753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=55 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=56 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=57 name=(null) inode=13755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=58 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=59 name=(null) inode=13756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=60 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=61 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=62 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=63 name=(null) inode=13758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=64 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=65 name=(null) inode=13759 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=66 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=67 name=(null) inode=13760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=68 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=69 name=(null) inode=13761 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=70 name=(null) inode=13757 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=71 name=(null) inode=13762 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=72 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=73 name=(null) inode=13763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=74 name=(null) inode=13763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=75 name=(null) inode=13764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=76 name=(null) inode=13763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=77 name=(null) inode=13765 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=78 name=(null) inode=13763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=79 name=(null) inode=13766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=80 name=(null) inode=13763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=81 name=(null) inode=13767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=82 name=(null) inode=13763 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=83 name=(null) inode=13768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=84 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=85 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=86 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=87 name=(null) inode=13770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=88 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=89 name=(null) inode=13771 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=90 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=91 name=(null) inode=13772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=92 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=93 name=(null) inode=13773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=94 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=95 name=(null) inode=13774 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=96 name=(null) inode=13754 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=97 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=98 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=99 name=(null) inode=13776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=100 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=101 name=(null) inode=13777 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=102 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=103 name=(null) inode=13778 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=104 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=105 name=(null) inode=13779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=106 name=(null) inode=13775 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=107 name=(null) inode=13780 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PATH item=109 name=(null) inode=13781 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:32.763000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:29:32.788637 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 14:29:32.840429 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 14:29:32.840477 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:29:32.869709 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:29:32.885196 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:29:32.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:32.895777 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:29:32.924289 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:29:32.954480 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:29:32.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:32.963056 systemd[1]: Reached target cryptsetup.target. Dec 13 14:29:32.973656 systemd[1]: Starting lvm2-activation.service... Dec 13 14:29:32.979552 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:29:33.008558 systemd[1]: Finished lvm2-activation.service. Dec 13 14:29:33.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.017011 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:29:33.025823 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:29:33.025884 systemd[1]: Reached target local-fs.target. Dec 13 14:29:33.034769 systemd[1]: Reached target machines.target. Dec 13 14:29:33.044684 systemd[1]: Starting ldconfig.service... Dec 13 14:29:33.052681 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:29:33.052777 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:33.054782 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:29:33.063622 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:29:33.075941 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:29:33.078306 systemd[1]: Starting systemd-sysext.service... Dec 13 14:29:33.079082 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1058 (bootctl) Dec 13 14:29:33.081221 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:29:33.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.104346 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:29:33.113015 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:29:33.123650 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:29:33.123966 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:29:33.146154 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:29:33.232352 systemd-fsck[1067]: fsck.fat 4.2 (2021-01-31) Dec 13 14:29:33.232352 systemd-fsck[1067]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:29:33.235672 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:29:33.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.248033 systemd[1]: Mounting boot.mount... Dec 13 14:29:33.270542 systemd[1]: Mounted boot.mount. Dec 13 14:29:33.292977 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:29:33.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.509073 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:29:33.538785 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:29:33.540528 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:29:33.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.557651 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:29:33.582194 (sd-sysext)[1073]: Using extensions 'kubernetes'. Dec 13 14:29:33.584872 (sd-sysext)[1073]: Merged extensions into '/usr'. Dec 13 14:29:33.611999 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:33.614885 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:29:33.622101 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:29:33.624248 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:29:33.633898 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:29:33.643892 systemd[1]: Starting modprobe@loop.service... Dec 13 14:29:33.651880 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:29:33.652147 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:33.652290 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:33.657030 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:29:33.664451 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:29:33.664720 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:29:33.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.674547 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:29:33.674791 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:29:33.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.683565 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:29:33.683839 systemd[1]: Finished modprobe@loop.service. Dec 13 14:29:33.684933 ldconfig[1057]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:29:33.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.692471 systemd[1]: Finished ldconfig.service. Dec 13 14:29:33.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.700576 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:29:33.700793 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:29:33.702513 systemd[1]: Finished systemd-sysext.service. Dec 13 14:29:33.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:33.712774 systemd[1]: Starting ensure-sysext.service... Dec 13 14:29:33.720812 systemd-networkd[1032]: eth0: Gained IPv6LL Dec 13 14:29:33.721804 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:29:33.733748 systemd[1]: Reloading. Dec 13 14:29:33.742638 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:29:33.745258 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:29:33.750718 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:29:33.827767 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-12-13T14:29:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:29:33.828562 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2024-12-13T14:29:33Z" level=info msg="torcx already run" Dec 13 14:29:34.022189 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:29:34.022219 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:29:34.046505 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:29:34.124000 audit: BPF prog-id=24 op=LOAD Dec 13 14:29:34.125000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:29:34.126000 audit: BPF prog-id=25 op=LOAD Dec 13 14:29:34.126000 audit: BPF prog-id=26 op=LOAD Dec 13 14:29:34.126000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:29:34.126000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:29:34.127000 audit: BPF prog-id=27 op=LOAD Dec 13 14:29:34.127000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:29:34.127000 audit: BPF prog-id=28 op=LOAD Dec 13 14:29:34.127000 audit: BPF prog-id=29 op=LOAD Dec 13 14:29:34.127000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:29:34.127000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:29:34.128000 audit: BPF prog-id=30 op=LOAD Dec 13 14:29:34.128000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:29:34.128000 audit: BPF prog-id=31 op=LOAD Dec 13 14:29:34.128000 audit: BPF prog-id=32 op=LOAD Dec 13 14:29:34.129000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:29:34.129000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:29:34.140327 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:29:34.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:34.155369 systemd[1]: Starting audit-rules.service... Dec 13 14:29:34.164683 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:29:34.175097 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:29:34.186438 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:29:34.194000 audit: BPF prog-id=33 op=LOAD Dec 13 14:29:34.198159 systemd[1]: Starting systemd-resolved.service... Dec 13 14:29:34.204000 audit: BPF prog-id=34 op=LOAD Dec 13 14:29:34.207473 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:29:34.216774 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:29:34.225701 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:29:34.226000 audit[1169]: SYSTEM_BOOT pid=1169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:29:34.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:34.234448 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:29:34.234728 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:29:34.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:34.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:34.249978 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:34.250480 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:29:34.255377 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:29:34.265235 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:29:34.275084 systemd[1]: Starting modprobe@loop.service... Dec 13 14:29:34.282000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:29:34.282000 audit[1176]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd12db2e60 a2=420 a3=0 items=0 ppid=1145 pid=1176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:34.282000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:29:34.284008 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:29:34.285917 augenrules[1176]: No rules Dec 13 14:29:34.291679 enable-oslogin[1183]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:29:34.292835 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:29:34.293200 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:34.293524 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:29:34.293836 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:34.297719 systemd[1]: Finished audit-rules.service. Dec 13 14:29:34.305725 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:29:34.316743 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:29:34.316979 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:29:34.326758 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:29:34.326996 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:29:34.336674 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:29:34.336897 systemd[1]: Finished modprobe@loop.service. Dec 13 14:29:34.346760 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:29:34.347021 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:29:34.356891 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:29:34.357193 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:29:34.360213 systemd[1]: Starting systemd-update-done.service... Dec 13 14:29:34.368900 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:29:34.371227 systemd-resolved[1160]: Positive Trust Anchors: Dec 13 14:29:34.371251 systemd-resolved[1160]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:29:34.371304 systemd-resolved[1160]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:29:34.378461 systemd[1]: Finished systemd-update-done.service. Dec 13 14:29:34.391231 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:34.391585 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:29:34.394496 systemd-timesyncd[1165]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 14:29:34.394668 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:29:34.395380 systemd-timesyncd[1165]: Initial clock synchronization to Fri 2024-12-13 14:29:34.433321 UTC. Dec 13 14:29:34.404199 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:29:34.414044 systemd[1]: Starting modprobe@loop.service... Dec 13 14:29:34.415336 systemd-resolved[1160]: Defaulting to hostname 'linux'. Dec 13 14:29:34.422534 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:29:34.427028 enable-oslogin[1189]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:29:34.430785 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:29:34.431057 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:34.431266 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:29:34.431417 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:34.433122 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:29:34.442875 systemd[1]: Started systemd-resolved.service. Dec 13 14:29:34.452429 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:29:34.452699 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:29:34.461403 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:29:34.461647 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:29:34.470338 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:29:34.470568 systemd[1]: Finished modprobe@loop.service. Dec 13 14:29:34.479381 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:29:34.479684 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:29:34.492332 systemd[1]: Reached target network.target. Dec 13 14:29:34.500913 systemd[1]: Reached target nss-lookup.target. Dec 13 14:29:34.510928 systemd[1]: Reached target time-set.target. Dec 13 14:29:34.519872 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:34.520318 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:29:34.522596 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:29:34.531668 systemd[1]: Starting modprobe@drm.service... Dec 13 14:29:34.540851 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:29:34.549948 systemd[1]: Starting modprobe@loop.service... Dec 13 14:29:34.558595 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:29:34.563325 enable-oslogin[1194]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:29:34.566851 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:29:34.567122 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:34.569277 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:29:34.577821 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:29:34.578059 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:34.580667 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:29:34.580899 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:29:34.590375 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:29:34.590597 systemd[1]: Finished modprobe@drm.service. Dec 13 14:29:34.599361 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:29:34.599597 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:29:34.608395 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:29:34.608646 systemd[1]: Finished modprobe@loop.service. Dec 13 14:29:34.617406 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:29:34.617702 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:29:34.626406 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:29:34.636807 systemd[1]: Reached target network-online.target. Dec 13 14:29:34.644922 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:29:34.644999 systemd[1]: Reached target sysinit.target. Dec 13 14:29:34.653927 systemd[1]: Started motdgen.path. Dec 13 14:29:34.660814 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:29:34.671103 systemd[1]: Started logrotate.timer. Dec 13 14:29:34.677993 systemd[1]: Started mdadm.timer. Dec 13 14:29:34.684807 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:29:34.693802 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:29:34.693865 systemd[1]: Reached target paths.target. Dec 13 14:29:34.700758 systemd[1]: Reached target timers.target. Dec 13 14:29:34.708668 systemd[1]: Listening on dbus.socket. Dec 13 14:29:34.718540 systemd[1]: Starting docker.socket... Dec 13 14:29:34.730169 systemd[1]: Listening on sshd.socket. Dec 13 14:29:34.736958 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:34.737059 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:29:34.738145 systemd[1]: Finished ensure-sysext.service. Dec 13 14:29:34.747114 systemd[1]: Listening on docker.socket. Dec 13 14:29:34.755100 systemd[1]: Reached target sockets.target. Dec 13 14:29:34.763795 systemd[1]: Reached target basic.target. Dec 13 14:29:34.770837 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:29:34.770882 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:29:34.772873 systemd[1]: Starting containerd.service... Dec 13 14:29:34.781412 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:29:34.792834 systemd[1]: Starting dbus.service... Dec 13 14:29:34.802888 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:29:34.812030 systemd[1]: Starting extend-filesystems.service... Dec 13 14:29:34.821504 jq[1201]: false Dec 13 14:29:34.819816 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:29:34.822510 systemd[1]: Starting kubelet.service... Dec 13 14:29:34.829555 systemd[1]: Starting motdgen.service... Dec 13 14:29:34.838876 systemd[1]: Starting oem-gce.service... Dec 13 14:29:34.849143 systemd[1]: Starting prepare-helm.service... Dec 13 14:29:34.857779 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:29:34.866339 systemd[1]: Starting sshd-keygen.service... Dec 13 14:29:34.875972 extend-filesystems[1202]: Found loop1 Dec 13 14:29:34.878588 systemd[1]: Starting systemd-logind.service... Dec 13 14:29:34.895888 extend-filesystems[1202]: Found sda Dec 13 14:29:34.895888 extend-filesystems[1202]: Found sda1 Dec 13 14:29:34.895888 extend-filesystems[1202]: Found sda2 Dec 13 14:29:34.895888 extend-filesystems[1202]: Found sda3 Dec 13 14:29:34.895888 extend-filesystems[1202]: Found usr Dec 13 14:29:34.895888 extend-filesystems[1202]: Found sda4 Dec 13 14:29:34.895888 extend-filesystems[1202]: Found sda6 Dec 13 14:29:34.895888 extend-filesystems[1202]: Found sda7 Dec 13 14:29:34.895888 extend-filesystems[1202]: Found sda9 Dec 13 14:29:34.895888 extend-filesystems[1202]: Checking size of /dev/sda9 Dec 13 14:29:35.138177 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 14:29:35.138276 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 14:29:35.138310 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:29:34.902810 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:35.035531 dbus-daemon[1200]: [system] SELinux support is enabled Dec 13 14:29:35.142342 extend-filesystems[1202]: Resized partition /dev/sda9 Dec 13 14:29:34.902978 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 14:29:35.086339 dbus-daemon[1200]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1032 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:29:35.149436 extend-filesystems[1237]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:29:35.193178 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:29:35.193237 update_engine[1223]: I1213 14:29:35.165477 1223 main.cc:92] Flatcar Update Engine starting Dec 13 14:29:34.903955 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:29:35.193885 extend-filesystems[1237]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 14:29:35.193885 extend-filesystems[1237]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 14:29:35.193885 extend-filesystems[1237]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 14:29:35.252852 jq[1225]: true Dec 13 14:29:34.906181 systemd[1]: Starting update-engine.service... Dec 13 14:29:35.253547 extend-filesystems[1202]: Resized filesystem in /dev/sda9 Dec 13 14:29:35.262857 update_engine[1223]: I1213 14:29:35.203600 1223 update_check_scheduler.cc:74] Next update check in 3m31s Dec 13 14:29:35.263042 tar[1229]: linux-amd64/helm Dec 13 14:29:34.915019 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:29:34.927799 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:29:34.928168 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:29:34.935595 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:29:35.265016 mkfs.ext4[1235]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 14:29:35.265016 mkfs.ext4[1235]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 14:29:35.265016 mkfs.ext4[1235]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 14:29:35.265016 mkfs.ext4[1235]: Filesystem UUID: 662e6a64-23e8-46a0-befb-86c4db34d102 Dec 13 14:29:35.265016 mkfs.ext4[1235]: Superblock backups stored on blocks: Dec 13 14:29:35.265016 mkfs.ext4[1235]: 32768, 98304, 163840, 229376 Dec 13 14:29:35.265016 mkfs.ext4[1235]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:29:35.265016 mkfs.ext4[1235]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:29:35.265016 mkfs.ext4[1235]: Creating journal (8192 blocks): done Dec 13 14:29:35.265016 mkfs.ext4[1235]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:29:34.936847 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:29:34.955414 systemd[1]: Created slice system-sshd.slice. Dec 13 14:29:35.266196 jq[1239]: true Dec 13 14:29:34.979826 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:29:34.980175 systemd[1]: Finished motdgen.service. Dec 13 14:29:35.054799 systemd[1]: Started dbus.service. Dec 13 14:29:35.268476 umount[1242]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 14:29:35.072273 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:29:35.072330 systemd[1]: Reached target system-config.target. Dec 13 14:29:35.080840 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:29:35.080885 systemd[1]: Reached target user-config.target. Dec 13 14:29:35.097949 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:29:35.156086 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:29:35.156387 systemd[1]: Finished extend-filesystems.service. Dec 13 14:29:35.212356 systemd[1]: Started update-engine.service. Dec 13 14:29:35.224824 systemd[1]: Started locksmithd.service. Dec 13 14:29:35.333242 systemd-logind[1218]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:29:35.335555 systemd-logind[1218]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:29:35.336702 systemd-logind[1218]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:29:35.341561 systemd-logind[1218]: New seat seat0. Dec 13 14:29:35.358070 systemd[1]: Started systemd-logind.service. Dec 13 14:29:35.382170 dbus-daemon[1200]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:29:35.382385 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:29:35.383478 dbus-daemon[1200]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1250 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:29:35.396442 systemd[1]: Starting polkit.service... Dec 13 14:29:35.400118 bash[1272]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:29:35.427276 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:29:35.461824 env[1234]: time="2024-12-13T14:29:35.461734890Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:29:35.507441 coreos-metadata[1199]: Dec 13 14:29:35.507 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 14:29:35.511286 coreos-metadata[1199]: Dec 13 14:29:35.511 INFO Fetch failed with 404: resource not found Dec 13 14:29:35.511506 coreos-metadata[1199]: Dec 13 14:29:35.511 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 14:29:35.512581 coreos-metadata[1199]: Dec 13 14:29:35.512 INFO Fetch successful Dec 13 14:29:35.512726 coreos-metadata[1199]: Dec 13 14:29:35.512 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 14:29:35.513958 coreos-metadata[1199]: Dec 13 14:29:35.513 INFO Fetch failed with 404: resource not found Dec 13 14:29:35.514069 coreos-metadata[1199]: Dec 13 14:29:35.513 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 14:29:35.514767 coreos-metadata[1199]: Dec 13 14:29:35.514 INFO Fetch failed with 404: resource not found Dec 13 14:29:35.514895 coreos-metadata[1199]: Dec 13 14:29:35.514 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 14:29:35.515740 coreos-metadata[1199]: Dec 13 14:29:35.515 INFO Fetch successful Dec 13 14:29:35.522836 unknown[1199]: wrote ssh authorized keys file for user: core Dec 13 14:29:35.550519 update-ssh-keys[1277]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:29:35.551109 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:29:35.607834 polkitd[1275]: Started polkitd version 121 Dec 13 14:29:35.655763 polkitd[1275]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:29:35.655886 polkitd[1275]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:29:35.674504 polkitd[1275]: Finished loading, compiling and executing 2 rules Dec 13 14:29:35.675249 dbus-daemon[1200]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:29:35.675523 systemd[1]: Started polkit.service. Dec 13 14:29:35.679067 polkitd[1275]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:29:35.729530 systemd-hostnamed[1250]: Hostname set to (transient) Dec 13 14:29:35.733888 systemd-resolved[1160]: System hostname changed to 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal'. Dec 13 14:29:35.737182 env[1234]: time="2024-12-13T14:29:35.726405957Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:29:35.737587 env[1234]: time="2024-12-13T14:29:35.737549023Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:35.748156 env[1234]: time="2024-12-13T14:29:35.748079999Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:29:35.748441 env[1234]: time="2024-12-13T14:29:35.748411000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:35.748973 env[1234]: time="2024-12-13T14:29:35.748937813Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:29:35.749101 env[1234]: time="2024-12-13T14:29:35.749079477Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:35.749200 env[1234]: time="2024-12-13T14:29:35.749178815Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:29:35.749299 env[1234]: time="2024-12-13T14:29:35.749280391Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:35.749506 env[1234]: time="2024-12-13T14:29:35.749474972Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:35.750028 env[1234]: time="2024-12-13T14:29:35.749995568Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:35.750436 env[1234]: time="2024-12-13T14:29:35.750401930Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:29:35.753553 env[1234]: time="2024-12-13T14:29:35.753515336Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:29:35.756459 env[1234]: time="2024-12-13T14:29:35.756420870Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:29:35.756633 env[1234]: time="2024-12-13T14:29:35.756588590Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.764695448Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.764765354Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.764790482Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.764868115Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.764966731Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.764993263Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.765020116Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.765043527Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.765066739Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.765091893Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.765115140Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.765139467Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.765319307Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:29:35.769642 env[1234]: time="2024-12-13T14:29:35.765482918Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766087067Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766149318Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766178615Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766281919Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766308087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766418924Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766442471Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766463884Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766487093Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766507776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766526934Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766553737Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766761315Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766788737Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770332 env[1234]: time="2024-12-13T14:29:35.766812345Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.770996 env[1234]: time="2024-12-13T14:29:35.766839067Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:29:35.770996 env[1234]: time="2024-12-13T14:29:35.766870537Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:29:35.770996 env[1234]: time="2024-12-13T14:29:35.766894081Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:29:35.770996 env[1234]: time="2024-12-13T14:29:35.766926482Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:29:35.770996 env[1234]: time="2024-12-13T14:29:35.766993355Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:29:35.771228 env[1234]: time="2024-12-13T14:29:35.767360617Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:29:35.771228 env[1234]: time="2024-12-13T14:29:35.767460217Z" level=info msg="Connect containerd service" Dec 13 14:29:35.771228 env[1234]: time="2024-12-13T14:29:35.767508054Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:29:35.774813 env[1234]: time="2024-12-13T14:29:35.773121309Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:29:35.774813 env[1234]: time="2024-12-13T14:29:35.773304757Z" level=info msg="Start subscribing containerd event" Dec 13 14:29:35.774813 env[1234]: time="2024-12-13T14:29:35.773394861Z" level=info msg="Start recovering state" Dec 13 14:29:35.774813 env[1234]: time="2024-12-13T14:29:35.773524497Z" level=info msg="Start event monitor" Dec 13 14:29:35.774813 env[1234]: time="2024-12-13T14:29:35.773549906Z" level=info msg="Start snapshots syncer" Dec 13 14:29:35.774813 env[1234]: time="2024-12-13T14:29:35.773565409Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:29:35.774813 env[1234]: time="2024-12-13T14:29:35.773579059Z" level=info msg="Start streaming server" Dec 13 14:29:35.774813 env[1234]: time="2024-12-13T14:29:35.774318610Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:29:35.774813 env[1234]: time="2024-12-13T14:29:35.774427386Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:29:35.782955 systemd[1]: Started containerd.service. Dec 13 14:29:35.796495 env[1234]: time="2024-12-13T14:29:35.783439321Z" level=info msg="containerd successfully booted in 0.326552s" Dec 13 14:29:36.799711 tar[1229]: linux-amd64/LICENSE Dec 13 14:29:36.804194 tar[1229]: linux-amd64/README.md Dec 13 14:29:36.819487 systemd[1]: Finished prepare-helm.service. Dec 13 14:29:37.357091 systemd[1]: Started kubelet.service. Dec 13 14:29:38.166836 locksmithd[1258]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:29:38.436237 sshd_keygen[1243]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:29:38.529031 systemd[1]: Finished sshd-keygen.service. Dec 13 14:29:38.538426 systemd[1]: Starting issuegen.service... Dec 13 14:29:38.549096 systemd[1]: Started sshd@0-10.128.0.53:22-139.178.68.195:55426.service. Dec 13 14:29:38.562527 systemd[1]: Started sshd@1-10.128.0.53:22-218.92.0.207:63576.service. Dec 13 14:29:38.575362 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:29:38.575682 systemd[1]: Finished issuegen.service. Dec 13 14:29:38.586864 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:29:38.615559 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:29:38.626466 systemd[1]: Started getty@tty1.service. Dec 13 14:29:38.639192 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:29:38.646475 systemd[1]: Reached target getty.target. Dec 13 14:29:38.871142 kubelet[1301]: E1213 14:29:38.870961 1301 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:29:38.874555 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:29:38.874799 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:29:38.875301 systemd[1]: kubelet.service: Consumed 1.568s CPU time. Dec 13 14:29:38.930723 sshd[1317]: Accepted publickey for core from 139.178.68.195 port 55426 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:29:38.933832 sshd[1317]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:38.954699 systemd[1]: Created slice user-500.slice. Dec 13 14:29:38.964122 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:29:38.976121 systemd-logind[1218]: New session 1 of user core. Dec 13 14:29:38.984698 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:29:38.998704 systemd[1]: Starting user@500.service... Dec 13 14:29:39.023999 (systemd)[1327]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:39.212980 systemd[1327]: Queued start job for default target default.target. Dec 13 14:29:39.214252 systemd[1327]: Reached target paths.target. Dec 13 14:29:39.214295 systemd[1327]: Reached target sockets.target. Dec 13 14:29:39.214317 systemd[1327]: Reached target timers.target. Dec 13 14:29:39.214337 systemd[1327]: Reached target basic.target. Dec 13 14:29:39.214417 systemd[1327]: Reached target default.target. Dec 13 14:29:39.214474 systemd[1327]: Startup finished in 176ms. Dec 13 14:29:39.214530 systemd[1]: Started user@500.service. Dec 13 14:29:39.223564 systemd[1]: Started session-1.scope. Dec 13 14:29:39.459660 systemd[1]: Started sshd@2-10.128.0.53:22-139.178.68.195:51204.service. Dec 13 14:29:39.773987 sshd[1336]: Accepted publickey for core from 139.178.68.195 port 51204 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:29:39.775092 sshd[1336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:39.784462 systemd[1]: Started session-2.scope. Dec 13 14:29:39.785692 systemd-logind[1218]: New session 2 of user core. Dec 13 14:29:39.995938 sshd[1336]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:40.001703 systemd[1]: sshd@2-10.128.0.53:22-139.178.68.195:51204.service: Deactivated successfully. Dec 13 14:29:40.003129 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:29:40.005854 systemd-logind[1218]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:29:40.007672 systemd-logind[1218]: Removed session 2. Dec 13 14:29:40.041953 systemd[1]: Started sshd@3-10.128.0.53:22-139.178.68.195:51208.service. Dec 13 14:29:40.396936 sshd[1343]: Accepted publickey for core from 139.178.68.195 port 51208 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:29:40.383302 sshd[1343]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:40.410736 systemd[1]: Started session-3.scope. Dec 13 14:29:40.411694 systemd-logind[1218]: New session 3 of user core. Dec 13 14:29:40.619943 sshd[1343]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:40.625326 systemd[1]: sshd@3-10.128.0.53:22-139.178.68.195:51208.service: Deactivated successfully. Dec 13 14:29:40.626628 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:29:40.629270 systemd-logind[1218]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:29:40.631051 systemd-logind[1218]: Removed session 3. Dec 13 14:29:41.537576 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 14:29:43.659678 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:29:43.685994 systemd-nspawn[1349]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 14:29:43.685994 systemd-nspawn[1349]: Press ^] three times within 1s to kill container. Dec 13 14:29:43.698658 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:29:43.784955 systemd[1]: Started oem-gce.service. Dec 13 14:29:43.785513 systemd[1]: Reached target multi-user.target. Dec 13 14:29:43.787953 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:29:43.800450 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:29:43.800737 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:29:43.804713 systemd[1]: Startup finished in 1.136s (kernel) + 7.813s (initrd) + 17.120s (userspace) = 26.070s. Dec 13 14:29:43.838526 systemd-nspawn[1349]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 14:29:43.838526 systemd-nspawn[1349]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 14:29:43.838848 systemd-nspawn[1349]: + /usr/bin/google_instance_setup Dec 13 14:29:44.438214 instance-setup[1355]: INFO Running google_set_multiqueue. Dec 13 14:29:44.452430 instance-setup[1355]: INFO Set channels for eth0 to 2. Dec 13 14:29:44.456462 instance-setup[1355]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 14:29:44.458143 instance-setup[1355]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 14:29:44.458575 instance-setup[1355]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 14:29:44.459868 instance-setup[1355]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 14:29:44.460328 instance-setup[1355]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 14:29:44.461797 instance-setup[1355]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 14:29:44.462133 instance-setup[1355]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 14:29:44.463526 instance-setup[1355]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 14:29:44.475525 instance-setup[1355]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 14:29:44.475737 instance-setup[1355]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 14:29:44.523742 systemd-nspawn[1349]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 14:29:44.869913 startup-script[1386]: INFO Starting startup scripts. Dec 13 14:29:44.884369 startup-script[1386]: INFO No startup scripts found in metadata. Dec 13 14:29:44.884546 startup-script[1386]: INFO Finished running startup scripts. Dec 13 14:29:44.923261 systemd-nspawn[1349]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 14:29:44.923261 systemd-nspawn[1349]: + daemon_pids=() Dec 13 14:29:44.923261 systemd-nspawn[1349]: + for d in accounts clock_skew network Dec 13 14:29:44.924298 systemd-nspawn[1349]: + daemon_pids+=($!) Dec 13 14:29:44.924298 systemd-nspawn[1349]: + for d in accounts clock_skew network Dec 13 14:29:44.924298 systemd-nspawn[1349]: + daemon_pids+=($!) Dec 13 14:29:44.924298 systemd-nspawn[1349]: + for d in accounts clock_skew network Dec 13 14:29:44.924523 systemd-nspawn[1349]: + daemon_pids+=($!) Dec 13 14:29:44.924523 systemd-nspawn[1349]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 14:29:44.924523 systemd-nspawn[1349]: + /usr/bin/systemd-notify --ready Dec 13 14:29:44.925013 systemd-nspawn[1349]: + /usr/bin/google_network_daemon Dec 13 14:29:44.925181 systemd-nspawn[1349]: + /usr/bin/google_accounts_daemon Dec 13 14:29:44.925725 systemd-nspawn[1349]: + /usr/bin/google_clock_skew_daemon Dec 13 14:29:44.980596 systemd-nspawn[1349]: + wait -n 36 37 38 Dec 13 14:29:45.631085 google-networking[1391]: INFO Starting Google Networking daemon. Dec 13 14:29:45.633804 google-clock-skew[1390]: INFO Starting Google Clock Skew daemon. Dec 13 14:29:45.653112 google-clock-skew[1390]: INFO Clock drift token has changed: 0. Dec 13 14:29:45.660421 systemd-nspawn[1349]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 14:29:45.660657 systemd-nspawn[1349]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 14:29:45.661482 google-clock-skew[1390]: WARNING Failed to sync system time with hardware clock. Dec 13 14:29:45.699869 groupadd[1401]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 14:29:45.702772 groupadd[1401]: group added to /etc/gshadow: name=google-sudoers Dec 13 14:29:45.707109 groupadd[1401]: new group: name=google-sudoers, GID=1000 Dec 13 14:29:45.719755 google-accounts[1389]: INFO Starting Google Accounts daemon. Dec 13 14:29:45.745676 google-accounts[1389]: WARNING OS Login not installed. Dec 13 14:29:45.746723 google-accounts[1389]: INFO Creating a new user account for 0. Dec 13 14:29:45.752070 systemd-nspawn[1349]: useradd: invalid user name '0': use --badname to ignore Dec 13 14:29:45.752743 google-accounts[1389]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 14:29:49.126244 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:29:49.126639 systemd[1]: Stopped kubelet.service. Dec 13 14:29:49.126728 systemd[1]: kubelet.service: Consumed 1.568s CPU time. Dec 13 14:29:49.129312 systemd[1]: Starting kubelet.service... Dec 13 14:29:49.408783 systemd[1]: Started kubelet.service. Dec 13 14:29:49.489705 kubelet[1415]: E1213 14:29:49.489579 1415 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:29:49.495088 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:29:49.495319 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:29:50.679009 systemd[1]: Started sshd@4-10.128.0.53:22-139.178.68.195:56110.service. Dec 13 14:29:50.963000 sshd[1422]: Accepted publickey for core from 139.178.68.195 port 56110 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:29:50.965208 sshd[1422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:50.972090 systemd-logind[1218]: New session 4 of user core. Dec 13 14:29:50.972991 systemd[1]: Started session-4.scope. Dec 13 14:29:51.177065 sshd[1422]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:51.181854 systemd[1]: sshd@4-10.128.0.53:22-139.178.68.195:56110.service: Deactivated successfully. Dec 13 14:29:51.183085 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:29:51.184007 systemd-logind[1218]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:29:51.185327 systemd-logind[1218]: Removed session 4. Dec 13 14:29:51.224036 systemd[1]: Started sshd@5-10.128.0.53:22-139.178.68.195:56120.service. Dec 13 14:29:51.507908 sshd[1428]: Accepted publickey for core from 139.178.68.195 port 56120 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:29:51.510361 sshd[1428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:51.517701 systemd-logind[1218]: New session 5 of user core. Dec 13 14:29:51.518669 systemd[1]: Started session-5.scope. Dec 13 14:29:51.715930 sshd[1428]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:51.720865 systemd[1]: sshd@5-10.128.0.53:22-139.178.68.195:56120.service: Deactivated successfully. Dec 13 14:29:51.722225 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:29:51.723288 systemd-logind[1218]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:29:51.724765 systemd-logind[1218]: Removed session 5. Dec 13 14:29:51.762283 systemd[1]: Started sshd@6-10.128.0.53:22-139.178.68.195:56122.service. Dec 13 14:29:52.046150 sshd[1434]: Accepted publickey for core from 139.178.68.195 port 56122 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:29:52.048247 sshd[1434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:52.055696 systemd[1]: Started session-6.scope. Dec 13 14:29:52.056515 systemd-logind[1218]: New session 6 of user core. Dec 13 14:29:52.261104 sshd[1434]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:52.266109 systemd-logind[1218]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:29:52.266667 systemd[1]: sshd@6-10.128.0.53:22-139.178.68.195:56122.service: Deactivated successfully. Dec 13 14:29:52.267956 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:29:52.269087 systemd-logind[1218]: Removed session 6. Dec 13 14:29:52.308740 systemd[1]: Started sshd@7-10.128.0.53:22-139.178.68.195:56132.service. Dec 13 14:29:52.594599 sshd[1440]: Accepted publickey for core from 139.178.68.195 port 56132 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:29:52.596892 sshd[1440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:52.604131 systemd[1]: Started session-7.scope. Dec 13 14:29:52.604935 systemd-logind[1218]: New session 7 of user core. Dec 13 14:29:52.793873 sudo[1443]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:29:52.794333 sudo[1443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:29:52.803902 dbus-daemon[1200]: Э\xfbM\u000eV: received setenforce notice (enforcing=-2051636352) Dec 13 14:29:52.806504 sudo[1443]: pam_unix(sudo:session): session closed for user root Dec 13 14:29:52.851442 sshd[1440]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:52.857257 systemd[1]: sshd@7-10.128.0.53:22-139.178.68.195:56132.service: Deactivated successfully. Dec 13 14:29:52.858604 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:29:52.859590 systemd-logind[1218]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:29:52.861002 systemd-logind[1218]: Removed session 7. Dec 13 14:29:52.897867 systemd[1]: Started sshd@8-10.128.0.53:22-139.178.68.195:56146.service. Dec 13 14:29:53.181677 sshd[1447]: Accepted publickey for core from 139.178.68.195 port 56146 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:29:53.183793 sshd[1447]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:53.191072 systemd[1]: Started session-8.scope. Dec 13 14:29:53.191870 systemd-logind[1218]: New session 8 of user core. Dec 13 14:29:53.359496 sudo[1451]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:29:53.359977 sudo[1451]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:29:53.364819 sudo[1451]: pam_unix(sudo:session): session closed for user root Dec 13 14:29:53.378437 sudo[1450]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:29:53.378883 sudo[1450]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:29:53.392585 systemd[1]: Stopping audit-rules.service... Dec 13 14:29:53.394000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:29:53.400248 kernel: kauditd_printk_skb: 206 callbacks suppressed Dec 13 14:29:53.400364 kernel: audit: type=1305 audit(1734100193.394:188): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:29:53.400409 auditctl[1454]: No rules Dec 13 14:29:53.401411 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:29:53.401703 systemd[1]: Stopped audit-rules.service. Dec 13 14:29:53.394000 audit[1454]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc04458640 a2=420 a3=0 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:53.417037 systemd[1]: Starting audit-rules.service... Dec 13 14:29:53.445908 kernel: audit: type=1300 audit(1734100193.394:188): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc04458640 a2=420 a3=0 items=0 ppid=1 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:53.446090 kernel: audit: type=1327 audit(1734100193.394:188): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:29:53.394000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:29:53.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.477016 kernel: audit: type=1131 audit(1734100193.401:189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.485119 augenrules[1471]: No rules Dec 13 14:29:53.486047 systemd[1]: Finished audit-rules.service. Dec 13 14:29:53.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.487917 sudo[1450]: pam_unix(sudo:session): session closed for user root Dec 13 14:29:53.487000 audit[1450]: USER_END pid=1450 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.533818 kernel: audit: type=1130 audit(1734100193.485:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.533985 kernel: audit: type=1106 audit(1734100193.487:191): pid=1450 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.534035 kernel: audit: type=1104 audit(1734100193.487:192): pid=1450 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.487000 audit[1450]: CRED_DISP pid=1450 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.534518 sshd[1447]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:53.541264 systemd-logind[1218]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:29:53.543925 systemd[1]: sshd@8-10.128.0.53:22-139.178.68.195:56146.service: Deactivated successfully. Dec 13 14:29:53.545218 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:29:53.547506 systemd-logind[1218]: Removed session 8. Dec 13 14:29:53.537000 audit[1447]: USER_END pid=1447 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:29:53.588972 kernel: audit: type=1106 audit(1734100193.537:193): pid=1447 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:29:53.590897 systemd[1]: Started sshd@9-10.128.0.53:22-139.178.68.195:56156.service. Dec 13 14:29:53.537000 audit[1447]: CRED_DISP pid=1447 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:29:53.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.53:22-139.178.68.195:56146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.641918 kernel: audit: type=1104 audit(1734100193.537:194): pid=1447 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:29:53.642099 kernel: audit: type=1131 audit(1734100193.543:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.53:22-139.178.68.195:56146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.53:22-139.178.68.195:56156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:53.880000 audit[1477]: USER_ACCT pid=1477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:29:53.881718 sshd[1477]: Accepted publickey for core from 139.178.68.195 port 56156 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:29:53.883000 audit[1477]: CRED_ACQ pid=1477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:29:53.883000 audit[1477]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe91ece5f0 a2=3 a3=0 items=0 ppid=1 pid=1477 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:53.883000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:53.884588 sshd[1477]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:53.891633 systemd-logind[1218]: New session 9 of user core. Dec 13 14:29:53.892648 systemd[1]: Started session-9.scope. Dec 13 14:29:53.900000 audit[1477]: USER_START pid=1477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:29:53.903000 audit[1479]: CRED_ACQ pid=1479 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:29:54.061000 audit[1480]: USER_ACCT pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:54.061817 sudo[1480]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:29:54.061000 audit[1480]: CRED_REFR pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:54.062272 sudo[1480]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:29:54.064000 audit[1480]: USER_START pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:54.099153 systemd[1]: Starting docker.service... Dec 13 14:29:54.154299 env[1490]: time="2024-12-13T14:29:54.154108008Z" level=info msg="Starting up" Dec 13 14:29:54.157502 env[1490]: time="2024-12-13T14:29:54.157446339Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:29:54.157502 env[1490]: time="2024-12-13T14:29:54.157478700Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:29:54.157745 env[1490]: time="2024-12-13T14:29:54.157511430Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:29:54.157745 env[1490]: time="2024-12-13T14:29:54.157529917Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:29:54.159940 env[1490]: time="2024-12-13T14:29:54.159889296Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:29:54.159940 env[1490]: time="2024-12-13T14:29:54.159914749Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:29:54.160153 env[1490]: time="2024-12-13T14:29:54.159942534Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:29:54.160153 env[1490]: time="2024-12-13T14:29:54.159958568Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:29:54.170381 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2695539751-merged.mount: Deactivated successfully. Dec 13 14:29:54.219186 env[1490]: time="2024-12-13T14:29:54.219123033Z" level=info msg="Loading containers: start." Dec 13 14:29:54.306000 audit[1520]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1520 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.306000 audit[1520]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fffb36b04d0 a2=0 a3=7fffb36b04bc items=0 ppid=1490 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:29:54.309000 audit[1522]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.309000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe1d9f3b50 a2=0 a3=7ffe1d9f3b3c items=0 ppid=1490 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.309000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:29:54.312000 audit[1524]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1524 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.312000 audit[1524]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff8ab3f280 a2=0 a3=7fff8ab3f26c items=0 ppid=1490 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.312000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:29:54.315000 audit[1526]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.315000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffde4296ec0 a2=0 a3=7ffde4296eac items=0 ppid=1490 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.315000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:29:54.319000 audit[1528]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1528 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.319000 audit[1528]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc48238cf0 a2=0 a3=7ffc48238cdc items=0 ppid=1490 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.319000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:29:54.343000 audit[1533]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.343000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef7502ec0 a2=0 a3=7ffef7502eac items=0 ppid=1490 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.343000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:29:54.353000 audit[1535]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.353000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffa9638a60 a2=0 a3=7fffa9638a4c items=0 ppid=1490 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.353000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:29:54.356000 audit[1537]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.356000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc39c17430 a2=0 a3=7ffc39c1741c items=0 ppid=1490 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.356000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:29:54.359000 audit[1539]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.359000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcec094d40 a2=0 a3=7ffcec094d2c items=0 ppid=1490 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.359000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:29:54.370000 audit[1543]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.370000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffd46c38d0 a2=0 a3=7fffd46c38bc items=0 ppid=1490 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.370000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:29:54.374000 audit[1544]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.374000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffda3c70520 a2=0 a3=7ffda3c7050c items=0 ppid=1490 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.374000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:29:54.393011 kernel: Initializing XFRM netlink socket Dec 13 14:29:54.442310 env[1490]: time="2024-12-13T14:29:54.439540690Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:29:54.471000 audit[1552]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1552 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.471000 audit[1552]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe85a60be0 a2=0 a3=7ffe85a60bcc items=0 ppid=1490 pid=1552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.471000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:29:54.486000 audit[1555]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.486000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff835c3a40 a2=0 a3=7fff835c3a2c items=0 ppid=1490 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.486000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:29:54.491000 audit[1558]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.491000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff609f26c0 a2=0 a3=7fff609f26ac items=0 ppid=1490 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.491000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:29:54.494000 audit[1560]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1560 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.494000 audit[1560]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdb1590600 a2=0 a3=7ffdb15905ec items=0 ppid=1490 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.494000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:29:54.497000 audit[1562]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.497000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc4b2a6020 a2=0 a3=7ffc4b2a600c items=0 ppid=1490 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.497000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:29:54.500000 audit[1564]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.500000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff972f9120 a2=0 a3=7fff972f910c items=0 ppid=1490 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.500000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:29:54.503000 audit[1566]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.503000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcb923f840 a2=0 a3=7ffcb923f82c items=0 ppid=1490 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.503000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:29:54.516000 audit[1569]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.516000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc31190290 a2=0 a3=7ffc3119027c items=0 ppid=1490 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.516000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:29:54.520000 audit[1571]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1571 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.520000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff9ecc34b0 a2=0 a3=7fff9ecc349c items=0 ppid=1490 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.520000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:29:54.523000 audit[1573]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.523000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffc64a9ac0 a2=0 a3=7fffc64a9aac items=0 ppid=1490 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.523000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:29:54.526000 audit[1575]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.526000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff28667c30 a2=0 a3=7fff28667c1c items=0 ppid=1490 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.526000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:29:54.529231 systemd-networkd[1032]: docker0: Link UP Dec 13 14:29:54.540000 audit[1579]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.540000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd95ae1530 a2=0 a3=7ffd95ae151c items=0 ppid=1490 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.540000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:29:54.546000 audit[1580]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1580 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:54.546000 audit[1580]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc871a40f0 a2=0 a3=7ffc871a40dc items=0 ppid=1490 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:54.546000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:29:54.549087 env[1490]: time="2024-12-13T14:29:54.549031868Z" level=info msg="Loading containers: done." Dec 13 14:29:54.573666 env[1490]: time="2024-12-13T14:29:54.573571078Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:29:54.573994 env[1490]: time="2024-12-13T14:29:54.573956715Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:29:54.574205 env[1490]: time="2024-12-13T14:29:54.574149734Z" level=info msg="Daemon has completed initialization" Dec 13 14:29:54.596017 systemd[1]: Started docker.service. Dec 13 14:29:54.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:54.610046 env[1490]: time="2024-12-13T14:29:54.609734425Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:29:55.780200 env[1234]: time="2024-12-13T14:29:55.780127376Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 14:29:56.222536 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2617733675.mount: Deactivated successfully. Dec 13 14:29:58.519729 env[1234]: time="2024-12-13T14:29:58.519642368Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:58.522673 env[1234]: time="2024-12-13T14:29:58.522594122Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:58.525276 env[1234]: time="2024-12-13T14:29:58.525218031Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:58.527648 env[1234]: time="2024-12-13T14:29:58.527585710Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:29:58.528723 env[1234]: time="2024-12-13T14:29:58.528656354Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 14:29:58.546826 env[1234]: time="2024-12-13T14:29:58.546754737Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 14:29:59.746867 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:29:59.747247 systemd[1]: Stopped kubelet.service. Dec 13 14:29:59.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:59.754898 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 14:29:59.755034 kernel: audit: type=1130 audit(1734100199.746:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:59.776997 systemd[1]: Starting kubelet.service... Dec 13 14:29:59.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:59.801638 kernel: audit: type=1131 audit(1734100199.746:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:59.986040 systemd[1]: Started kubelet.service. Dec 13 14:29:59.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:00.008660 kernel: audit: type=1130 audit(1734100199.986:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:00.097224 kubelet[1628]: E1213 14:30:00.097147 1628 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:30:00.101123 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:30:00.101365 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:30:00.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:30:00.123656 kernel: audit: type=1131 audit(1734100200.101:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:30:00.743920 env[1234]: time="2024-12-13T14:30:00.743838971Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:00.746995 env[1234]: time="2024-12-13T14:30:00.746935791Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:00.750264 env[1234]: time="2024-12-13T14:30:00.750210434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:00.754708 env[1234]: time="2024-12-13T14:30:00.754655019Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:00.755327 env[1234]: time="2024-12-13T14:30:00.755267925Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 14:30:00.773531 env[1234]: time="2024-12-13T14:30:00.773473904Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 14:30:02.519079 env[1234]: time="2024-12-13T14:30:02.518990771Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:02.522084 env[1234]: time="2024-12-13T14:30:02.522022607Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:02.526079 env[1234]: time="2024-12-13T14:30:02.526011871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:02.528317 env[1234]: time="2024-12-13T14:30:02.528267519Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:02.529522 env[1234]: time="2024-12-13T14:30:02.529468295Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 14:30:02.545745 env[1234]: time="2024-12-13T14:30:02.545678125Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:30:03.867873 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1824793201.mount: Deactivated successfully. Dec 13 14:30:04.567602 env[1234]: time="2024-12-13T14:30:04.567519710Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:04.570271 env[1234]: time="2024-12-13T14:30:04.570215018Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:04.572464 env[1234]: time="2024-12-13T14:30:04.572416375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:04.574361 env[1234]: time="2024-12-13T14:30:04.574318494Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:04.575033 env[1234]: time="2024-12-13T14:30:04.574981062Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:30:04.591122 env[1234]: time="2024-12-13T14:30:04.591064148Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:30:05.120417 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount193990952.mount: Deactivated successfully. Dec 13 14:30:05.763735 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:30:05.787005 kernel: audit: type=1131 audit(1734100205.763:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:05.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:05.806000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:30:05.821431 kernel: audit: type=1334 audit(1734100205.806:235): prog-id=40 op=UNLOAD Dec 13 14:30:05.821591 kernel: audit: type=1334 audit(1734100205.806:236): prog-id=39 op=UNLOAD Dec 13 14:30:05.806000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:30:05.806000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:30:05.829664 kernel: audit: type=1334 audit(1734100205.806:237): prog-id=38 op=UNLOAD Dec 13 14:30:06.487652 env[1234]: time="2024-12-13T14:30:06.487561725Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:06.516498 env[1234]: time="2024-12-13T14:30:06.516421647Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:06.646786 env[1234]: time="2024-12-13T14:30:06.646712277Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:06.974858 env[1234]: time="2024-12-13T14:30:06.974775656Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:06.978017 env[1234]: time="2024-12-13T14:30:06.976300686Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:30:06.997227 env[1234]: time="2024-12-13T14:30:06.997155219Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:30:07.403575 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount959286697.mount: Deactivated successfully. Dec 13 14:30:07.407981 env[1234]: time="2024-12-13T14:30:07.407911198Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:07.410347 env[1234]: time="2024-12-13T14:30:07.410277577Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:07.412646 env[1234]: time="2024-12-13T14:30:07.412581288Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:07.414833 env[1234]: time="2024-12-13T14:30:07.414769190Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:07.415838 env[1234]: time="2024-12-13T14:30:07.415795153Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:30:07.432243 env[1234]: time="2024-12-13T14:30:07.432192221Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 14:30:07.845990 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4048289722.mount: Deactivated successfully. Dec 13 14:30:10.250048 kernel: audit: type=1130 audit(1734100210.223:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:10.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:10.224723 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:30:10.225069 systemd[1]: Stopped kubelet.service. Dec 13 14:30:10.249510 systemd[1]: Starting kubelet.service... Dec 13 14:30:10.277913 kernel: audit: type=1131 audit(1734100210.223:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:10.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:10.525352 systemd[1]: Started kubelet.service. Dec 13 14:30:10.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:10.547643 kernel: audit: type=1130 audit(1734100210.524:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:10.652680 kubelet[1668]: E1213 14:30:10.652580 1668 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:30:10.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:30:10.656179 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:30:10.656420 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:30:10.678638 kernel: audit: type=1131 audit(1734100210.656:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:30:11.151177 env[1234]: time="2024-12-13T14:30:11.151100315Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:11.154963 env[1234]: time="2024-12-13T14:30:11.154910325Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:11.157555 env[1234]: time="2024-12-13T14:30:11.157506275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:11.160916 env[1234]: time="2024-12-13T14:30:11.160876800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:11.162418 env[1234]: time="2024-12-13T14:30:11.162368488Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 14:30:16.180656 systemd[1]: Stopped kubelet.service. Dec 13 14:30:16.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:16.205862 kernel: audit: type=1130 audit(1734100216.180:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:16.186134 systemd[1]: Starting kubelet.service... Dec 13 14:30:16.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:16.229484 kernel: audit: type=1131 audit(1734100216.180:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:16.243806 systemd[1]: Reloading. Dec 13 14:30:16.402500 /usr/lib/systemd/system-generators/torcx-generator[1765]: time="2024-12-13T14:30:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:30:16.402555 /usr/lib/systemd/system-generators/torcx-generator[1765]: time="2024-12-13T14:30:16Z" level=info msg="torcx already run" Dec 13 14:30:16.541364 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:30:16.541396 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:30:16.565666 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:30:16.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697601 kernel: audit: type=1400 audit(1734100216.655:244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697926 kernel: audit: type=1400 audit(1734100216.655:245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.718882 kernel: audit: type=1400 audit(1734100216.656:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760850 kernel: audit: type=1400 audit(1734100216.656:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.761066 kernel: audit: type=1400 audit(1734100216.656:248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.782125 kernel: audit: type=1400 audit(1734100216.656:249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.803251 kernel: audit: type=1400 audit(1734100216.656:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.803445 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:30:16.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.676000 audit: BPF prog-id=43 op=LOAD Dec 13 14:30:16.676000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:30:16.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.696000 audit: BPF prog-id=44 op=LOAD Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit: BPF prog-id=45 op=LOAD Dec 13 14:30:16.697000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:30:16.697000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.718000 audit: BPF prog-id=46 op=LOAD Dec 13 14:30:16.718000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:30:16.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit: BPF prog-id=47 op=LOAD Dec 13 14:30:16.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.760000 audit: BPF prog-id=48 op=LOAD Dec 13 14:30:16.760000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:30:16.760000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:30:16.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.808000 audit: BPF prog-id=49 op=LOAD Dec 13 14:30:16.808000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit: BPF prog-id=50 op=LOAD Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.809000 audit: BPF prog-id=51 op=LOAD Dec 13 14:30:16.809000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:30:16.809000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit: BPF prog-id=52 op=LOAD Dec 13 14:30:16.810000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit: BPF prog-id=53 op=LOAD Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.810000 audit: BPF prog-id=54 op=LOAD Dec 13 14:30:16.811000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:30:16.811000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:30:16.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.814000 audit: BPF prog-id=55 op=LOAD Dec 13 14:30:16.814000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:30:16.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.846000 audit: BPF prog-id=56 op=LOAD Dec 13 14:30:16.846000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:30:16.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.847000 audit: BPF prog-id=57 op=LOAD Dec 13 14:30:16.847000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:30:16.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:16.870763 systemd[1]: Started kubelet.service. Dec 13 14:30:16.879057 systemd[1]: Stopping kubelet.service... Dec 13 14:30:16.880229 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:30:16.880523 systemd[1]: Stopped kubelet.service. Dec 13 14:30:16.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:16.883456 systemd[1]: Starting kubelet.service... Dec 13 14:30:17.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:17.097429 systemd[1]: Started kubelet.service. Dec 13 14:30:17.173458 kubelet[1818]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:30:17.173458 kubelet[1818]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:30:17.173458 kubelet[1818]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:30:17.174276 kubelet[1818]: I1213 14:30:17.173556 1818 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:30:18.057259 kubelet[1818]: I1213 14:30:18.057187 1818 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:30:18.057259 kubelet[1818]: I1213 14:30:18.057237 1818 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:30:18.057695 kubelet[1818]: I1213 14:30:18.057656 1818 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:30:18.107279 kubelet[1818]: E1213 14:30:18.107216 1818 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.53:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:18.108956 kubelet[1818]: I1213 14:30:18.108915 1818 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:30:18.129278 kubelet[1818]: I1213 14:30:18.129215 1818 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:30:18.130750 kubelet[1818]: I1213 14:30:18.130706 1818 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:30:18.131083 kubelet[1818]: I1213 14:30:18.131045 1818 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:30:18.131311 kubelet[1818]: I1213 14:30:18.131085 1818 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:30:18.131311 kubelet[1818]: I1213 14:30:18.131105 1818 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:30:18.131462 kubelet[1818]: I1213 14:30:18.131333 1818 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:30:18.131518 kubelet[1818]: I1213 14:30:18.131504 1818 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:30:18.131566 kubelet[1818]: I1213 14:30:18.131531 1818 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:30:18.131634 kubelet[1818]: I1213 14:30:18.131585 1818 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:30:18.132217 kubelet[1818]: I1213 14:30:18.132184 1818 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:30:18.134380 kubelet[1818]: W1213 14:30:18.134313 1818 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.128.0.53:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:18.134511 kubelet[1818]: E1213 14:30:18.134399 1818 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.53:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:18.135087 kubelet[1818]: I1213 14:30:18.135062 1818 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:30:18.142177 kubelet[1818]: W1213 14:30:18.142110 1818 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.128.0.53:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:18.142361 kubelet[1818]: E1213 14:30:18.142342 1818 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.53:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:18.143403 kubelet[1818]: I1213 14:30:18.143357 1818 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:30:18.145308 kubelet[1818]: W1213 14:30:18.145265 1818 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:30:18.146311 kubelet[1818]: I1213 14:30:18.146280 1818 server.go:1256] "Started kubelet" Dec 13 14:30:18.146550 kubelet[1818]: I1213 14:30:18.146507 1818 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:30:18.147915 kubelet[1818]: I1213 14:30:18.147830 1818 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:30:18.150000 audit[1818]: AVC avc: denied { mac_admin } for pid=1818 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.150000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:18.150000 audit[1818]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000601bc0 a1=c000603200 a2=c000601b90 a3=25 items=0 ppid=1 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.150000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:18.150000 audit[1818]: AVC avc: denied { mac_admin } for pid=1818 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.150000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:18.150000 audit[1818]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00077ed60 a1=c000603218 a2=c000601c50 a3=25 items=0 ppid=1 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.150000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:18.152369 kubelet[1818]: I1213 14:30:18.151502 1818 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:30:18.152369 kubelet[1818]: I1213 14:30:18.151566 1818 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:30:18.152369 kubelet[1818]: I1213 14:30:18.151691 1818 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:30:18.157000 audit[1828]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:18.157000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffce4c49640 a2=0 a3=7ffce4c4962c items=0 ppid=1818 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:30:18.158981 kubelet[1818]: I1213 14:30:18.158952 1818 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:30:18.159408 kubelet[1818]: I1213 14:30:18.159385 1818 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:30:18.159000 audit[1829]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:18.159000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8a3890c0 a2=0 a3=7ffc8a3890ac items=0 ppid=1818 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:30:18.163997 kubelet[1818]: E1213 14:30:18.163965 1818 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.53:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.53:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal.1810c2f5f38896ff default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,UID:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 14:30:18.146232063 +0000 UTC m=+1.041247179,LastTimestamp:2024-12-13 14:30:18.146232063 +0000 UTC m=+1.041247179,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,}" Dec 13 14:30:18.166313 kubelet[1818]: I1213 14:30:18.166285 1818 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:30:18.168130 kubelet[1818]: E1213 14:30:18.168091 1818 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.53:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.53:6443: connect: connection refused" interval="200ms" Dec 13 14:30:18.168450 kubelet[1818]: I1213 14:30:18.168423 1818 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:30:18.168578 kubelet[1818]: I1213 14:30:18.168551 1818 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:30:18.170665 kubelet[1818]: I1213 14:30:18.170583 1818 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:30:18.171416 kubelet[1818]: W1213 14:30:18.171343 1818 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.128.0.53:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:18.171518 kubelet[1818]: E1213 14:30:18.171431 1818 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.53:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:18.171710 kubelet[1818]: I1213 14:30:18.171683 1818 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:30:18.171000 audit[1831]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:18.171000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6e903d70 a2=0 a3=7ffc6e903d5c items=0 ppid=1818 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:18.174520 kubelet[1818]: I1213 14:30:18.174496 1818 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:30:18.176000 audit[1833]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:18.176000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd22a4b070 a2=0 a3=7ffd22a4b05c items=0 ppid=1818 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:18.187000 audit[1836]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:18.187000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd730f13e0 a2=0 a3=7ffd730f13cc items=0 ppid=1818 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:30:18.189378 kubelet[1818]: I1213 14:30:18.189347 1818 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:30:18.190000 audit[1837]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:18.190000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee68c8470 a2=0 a3=7ffee68c845c items=0 ppid=1818 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:30:18.191834 kubelet[1818]: I1213 14:30:18.191811 1818 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:30:18.192015 kubelet[1818]: I1213 14:30:18.191984 1818 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:30:18.192099 kubelet[1818]: I1213 14:30:18.192039 1818 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:30:18.192160 kubelet[1818]: E1213 14:30:18.192134 1818 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:30:18.192000 audit[1839]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:18.192000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8db3b440 a2=0 a3=7ffc8db3b42c items=0 ppid=1818 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.192000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:30:18.194000 audit[1840]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:18.194000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce23243d0 a2=0 a3=7ffce23243bc items=0 ppid=1818 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.194000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:30:18.196000 audit[1841]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:18.196000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2d77d3d0 a2=0 a3=7ffd2d77d3bc items=0 ppid=1818 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:30:18.197000 audit[1842]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:18.197000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc52393aa0 a2=0 a3=7ffc52393a8c items=0 ppid=1818 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:30:18.199000 audit[1843]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:18.199000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffeb97e3170 a2=0 a3=7ffeb97e315c items=0 ppid=1818 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:30:18.201000 audit[1844]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:18.201000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcabc46b50 a2=0 a3=7ffcabc46b3c items=0 ppid=1818 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:30:18.207178 kubelet[1818]: W1213 14:30:18.207087 1818 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.128.0.53:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:18.207178 kubelet[1818]: E1213 14:30:18.207182 1818 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.53:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:18.207456 kubelet[1818]: E1213 14:30:18.207432 1818 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:30:18.218795 kubelet[1818]: I1213 14:30:18.218761 1818 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:30:18.218795 kubelet[1818]: I1213 14:30:18.218789 1818 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:30:18.219016 kubelet[1818]: I1213 14:30:18.218817 1818 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:30:18.223292 kubelet[1818]: I1213 14:30:18.223258 1818 policy_none.go:49] "None policy: Start" Dec 13 14:30:18.224218 kubelet[1818]: I1213 14:30:18.224191 1818 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:30:18.224364 kubelet[1818]: I1213 14:30:18.224230 1818 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:30:18.232237 systemd[1]: Created slice kubepods.slice. Dec 13 14:30:18.239901 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:30:18.244141 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:30:18.245716 kubelet[1818]: W1213 14:30:18.245665 1818 helpers.go:245] readString: Failed to read "/sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/cpuset.cpus.effective": read /sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/cpuset.cpus.effective: no such device Dec 13 14:30:18.250776 kubelet[1818]: I1213 14:30:18.250747 1818 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:30:18.250000 audit[1818]: AVC avc: denied { mac_admin } for pid=1818 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.250000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:18.250000 audit[1818]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ee4e40 a1=c000fa22b8 a2=c000ee4e10 a3=25 items=0 ppid=1 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.250000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:18.251438 kubelet[1818]: I1213 14:30:18.251087 1818 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:30:18.251504 kubelet[1818]: I1213 14:30:18.251447 1818 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:30:18.255759 kubelet[1818]: E1213 14:30:18.255649 1818 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" not found" Dec 13 14:30:18.273429 kubelet[1818]: I1213 14:30:18.273389 1818 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.274185 kubelet[1818]: E1213 14:30:18.274145 1818 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.53:6443/api/v1/nodes\": dial tcp 10.128.0.53:6443: connect: connection refused" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.292583 kubelet[1818]: I1213 14:30:18.292476 1818 topology_manager.go:215] "Topology Admit Handler" podUID="f42d661239ddcae8205bf16e03e345b4" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.302856 kubelet[1818]: I1213 14:30:18.302805 1818 topology_manager.go:215] "Topology Admit Handler" podUID="2815d1718299a25efdb922a2fbd2efbc" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.313680 kubelet[1818]: I1213 14:30:18.312591 1818 topology_manager.go:215] "Topology Admit Handler" podUID="e4b1bc99a76c612c509f831def026945" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.320461 systemd[1]: Created slice kubepods-burstable-podf42d661239ddcae8205bf16e03e345b4.slice. Dec 13 14:30:18.339888 systemd[1]: Created slice kubepods-burstable-pod2815d1718299a25efdb922a2fbd2efbc.slice. Dec 13 14:30:18.348669 systemd[1]: Created slice kubepods-burstable-pode4b1bc99a76c612c509f831def026945.slice. Dec 13 14:30:18.368836 kubelet[1818]: E1213 14:30:18.368787 1818 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.53:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.53:6443: connect: connection refused" interval="400ms" Dec 13 14:30:18.376123 kubelet[1818]: I1213 14:30:18.376064 1818 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f42d661239ddcae8205bf16e03e345b4-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"f42d661239ddcae8205bf16e03e345b4\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.376123 kubelet[1818]: I1213 14:30:18.376130 1818 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f42d661239ddcae8205bf16e03e345b4-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"f42d661239ddcae8205bf16e03e345b4\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.376388 kubelet[1818]: I1213 14:30:18.376184 1818 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f42d661239ddcae8205bf16e03e345b4-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"f42d661239ddcae8205bf16e03e345b4\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.376388 kubelet[1818]: I1213 14:30:18.376220 1818 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2815d1718299a25efdb922a2fbd2efbc-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"2815d1718299a25efdb922a2fbd2efbc\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.376388 kubelet[1818]: I1213 14:30:18.376256 1818 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/2815d1718299a25efdb922a2fbd2efbc-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"2815d1718299a25efdb922a2fbd2efbc\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.376388 kubelet[1818]: I1213 14:30:18.376291 1818 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2815d1718299a25efdb922a2fbd2efbc-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"2815d1718299a25efdb922a2fbd2efbc\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.376659 kubelet[1818]: I1213 14:30:18.376332 1818 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2815d1718299a25efdb922a2fbd2efbc-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"2815d1718299a25efdb922a2fbd2efbc\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.376659 kubelet[1818]: I1213 14:30:18.376387 1818 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e4b1bc99a76c612c509f831def026945-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"e4b1bc99a76c612c509f831def026945\") " pod="kube-system/kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.376659 kubelet[1818]: I1213 14:30:18.376431 1818 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2815d1718299a25efdb922a2fbd2efbc-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"2815d1718299a25efdb922a2fbd2efbc\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.479994 kubelet[1818]: I1213 14:30:18.479953 1818 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.480746 kubelet[1818]: E1213 14:30:18.480698 1818 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.53:6443/api/v1/nodes\": dial tcp 10.128.0.53:6443: connect: connection refused" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.635998 env[1234]: time="2024-12-13T14:30:18.635469888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,Uid:f42d661239ddcae8205bf16e03e345b4,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:18.644372 env[1234]: time="2024-12-13T14:30:18.644298730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,Uid:2815d1718299a25efdb922a2fbd2efbc,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:18.654428 env[1234]: time="2024-12-13T14:30:18.654369040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,Uid:e4b1bc99a76c612c509f831def026945,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:18.770496 kubelet[1818]: E1213 14:30:18.770437 1818 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.53:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.53:6443: connect: connection refused" interval="800ms" Dec 13 14:30:18.886573 kubelet[1818]: I1213 14:30:18.886028 1818 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.886573 kubelet[1818]: E1213 14:30:18.886544 1818 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.53:6443/api/v1/nodes\": dial tcp 10.128.0.53:6443: connect: connection refused" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:18.967540 kubelet[1818]: W1213 14:30:18.967431 1818 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.128.0.53:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:18.967540 kubelet[1818]: E1213 14:30:18.967535 1818 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.53:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:19.011950 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount990686883.mount: Deactivated successfully. Dec 13 14:30:19.021682 env[1234]: time="2024-12-13T14:30:19.021604967Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.023065 env[1234]: time="2024-12-13T14:30:19.022998458Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.026422 env[1234]: time="2024-12-13T14:30:19.026368148Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.027788 env[1234]: time="2024-12-13T14:30:19.027745406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.029928 env[1234]: time="2024-12-13T14:30:19.029881525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.031222 env[1234]: time="2024-12-13T14:30:19.031143645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.032167 env[1234]: time="2024-12-13T14:30:19.032122547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.033178 env[1234]: time="2024-12-13T14:30:19.033143090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.036673 env[1234]: time="2024-12-13T14:30:19.036633532Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.037593 env[1234]: time="2024-12-13T14:30:19.037557241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.041267 env[1234]: time="2024-12-13T14:30:19.041233060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.045157 env[1234]: time="2024-12-13T14:30:19.045104130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:19.103767 env[1234]: time="2024-12-13T14:30:19.103654055Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:19.103767 env[1234]: time="2024-12-13T14:30:19.103728496Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:19.104144 env[1234]: time="2024-12-13T14:30:19.104074321Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:19.104525 env[1234]: time="2024-12-13T14:30:19.104464247Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b2f0122218789e232e00d465f74f8c3f7a0c574f7604ae5723b9b3ccb1dd01a pid=1856 runtime=io.containerd.runc.v2 Dec 13 14:30:19.111538 env[1234]: time="2024-12-13T14:30:19.111118963Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:19.111538 env[1234]: time="2024-12-13T14:30:19.111313982Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:19.111538 env[1234]: time="2024-12-13T14:30:19.111407214Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:19.111803 env[1234]: time="2024-12-13T14:30:19.111751901Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26bb893286079086a6f24f8dea868df8e8ed20969ff697fe56892959888e3f29 pid=1870 runtime=io.containerd.runc.v2 Dec 13 14:30:19.112198 env[1234]: time="2024-12-13T14:30:19.112129147Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:19.112310 env[1234]: time="2024-12-13T14:30:19.112222359Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:19.112310 env[1234]: time="2024-12-13T14:30:19.112267326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:19.112667 env[1234]: time="2024-12-13T14:30:19.112543143Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7508f2fd04d9271872d0ab6099a24a1896823ad8e24419b84020b601d2e0df5e pid=1872 runtime=io.containerd.runc.v2 Dec 13 14:30:19.145284 systemd[1]: Started cri-containerd-26bb893286079086a6f24f8dea868df8e8ed20969ff697fe56892959888e3f29.scope. Dec 13 14:30:19.153350 systemd[1]: Started cri-containerd-7b2f0122218789e232e00d465f74f8c3f7a0c574f7604ae5723b9b3ccb1dd01a.scope. Dec 13 14:30:19.185297 systemd[1]: Started cri-containerd-7508f2fd04d9271872d0ab6099a24a1896823ad8e24419b84020b601d2e0df5e.scope. Dec 13 14:30:19.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.208000 audit: BPF prog-id=58 op=LOAD Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1870 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236626238393332383630373930383661366632346638646561383638 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1870 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236626238393332383630373930383661366632346638646561383638 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit: BPF prog-id=59 op=LOAD Dec 13 14:30:19.209000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030a600 items=0 ppid=1870 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236626238393332383630373930383661366632346638646561383638 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit: BPF prog-id=60 op=LOAD Dec 13 14:30:19.209000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030a648 items=0 ppid=1870 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236626238393332383630373930383661366632346638646561383638 Dec 13 14:30:19.209000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:30:19.209000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { perfmon } for pid=1897 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit[1897]: AVC avc: denied { bpf } for pid=1897 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.209000 audit: BPF prog-id=61 op=LOAD Dec 13 14:30:19.209000 audit[1897]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030aa58 items=0 ppid=1870 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236626238393332383630373930383661366632346638646561383638 Dec 13 14:30:19.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.236000 audit: BPF prog-id=62 op=LOAD Dec 13 14:30:19.237000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.237000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1872 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303866326664303464393237313837326430616236303939613234 Dec 13 14:30:19.237000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.237000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1872 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303866326664303464393237313837326430616236303939613234 Dec 13 14:30:19.238000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.239000 audit: BPF prog-id=63 op=LOAD Dec 13 14:30:19.239000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.239000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1856 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762326630313232323138373839653233326530306434363566373466 Dec 13 14:30:19.239000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.239000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1856 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762326630313232323138373839653233326530306434363566373466 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit: BPF prog-id=64 op=LOAD Dec 13 14:30:19.240000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d0100 items=0 ppid=1856 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762326630313232323138373839653233326530306434363566373466 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit: BPF prog-id=65 op=LOAD Dec 13 14:30:19.240000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d0148 items=0 ppid=1856 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762326630313232323138373839653233326530306434363566373466 Dec 13 14:30:19.240000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:30:19.240000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.240000 audit: BPF prog-id=66 op=LOAD Dec 13 14:30:19.240000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d0558 items=0 ppid=1856 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762326630313232323138373839653233326530306434363566373466 Dec 13 14:30:19.238000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.238000 audit: BPF prog-id=67 op=LOAD Dec 13 14:30:19.238000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00026bcf0 items=0 ppid=1872 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303866326664303464393237313837326430616236303939613234 Dec 13 14:30:19.248000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.248000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.248000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.248000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.248000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.248000 audit: BPF prog-id=68 op=LOAD Dec 13 14:30:19.248000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00026bd38 items=0 ppid=1872 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303866326664303464393237313837326430616236303939613234 Dec 13 14:30:19.250000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:30:19.250000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:30:19.250000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.250000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.250000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.250000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.250000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.250000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.250000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.250000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.250000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.250000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.250000 audit: BPF prog-id=69 op=LOAD Dec 13 14:30:19.250000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ea148 items=0 ppid=1872 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303866326664303464393237313837326430616236303939613234 Dec 13 14:30:19.300674 env[1234]: time="2024-12-13T14:30:19.297318750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,Uid:f42d661239ddcae8205bf16e03e345b4,Namespace:kube-system,Attempt:0,} returns sandbox id \"26bb893286079086a6f24f8dea868df8e8ed20969ff697fe56892959888e3f29\"" Dec 13 14:30:19.301152 kubelet[1818]: E1213 14:30:19.301114 1818 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-21291" Dec 13 14:30:19.305269 env[1234]: time="2024-12-13T14:30:19.305209573Z" level=info msg="CreateContainer within sandbox \"26bb893286079086a6f24f8dea868df8e8ed20969ff697fe56892959888e3f29\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:30:19.330938 env[1234]: time="2024-12-13T14:30:19.330866771Z" level=info msg="CreateContainer within sandbox \"26bb893286079086a6f24f8dea868df8e8ed20969ff697fe56892959888e3f29\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"60e3c37b84bcc43fe0e691c79e42044e9bc574701834c280c6b4128022b3cf50\"" Dec 13 14:30:19.331914 env[1234]: time="2024-12-13T14:30:19.331863569Z" level=info msg="StartContainer for \"60e3c37b84bcc43fe0e691c79e42044e9bc574701834c280c6b4128022b3cf50\"" Dec 13 14:30:19.340503 env[1234]: time="2024-12-13T14:30:19.340444933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,Uid:2815d1718299a25efdb922a2fbd2efbc,Namespace:kube-system,Attempt:0,} returns sandbox id \"7508f2fd04d9271872d0ab6099a24a1896823ad8e24419b84020b601d2e0df5e\"" Dec 13 14:30:19.345180 kubelet[1818]: E1213 14:30:19.344576 1818 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flat" Dec 13 14:30:19.347495 env[1234]: time="2024-12-13T14:30:19.347433619Z" level=info msg="CreateContainer within sandbox \"7508f2fd04d9271872d0ab6099a24a1896823ad8e24419b84020b601d2e0df5e\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:30:19.364116 env[1234]: time="2024-12-13T14:30:19.364041364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,Uid:e4b1bc99a76c612c509f831def026945,Namespace:kube-system,Attempt:0,} returns sandbox id \"7b2f0122218789e232e00d465f74f8c3f7a0c574f7604ae5723b9b3ccb1dd01a\"" Dec 13 14:30:19.366687 kubelet[1818]: E1213 14:30:19.366646 1818 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-21291" Dec 13 14:30:19.368131 env[1234]: time="2024-12-13T14:30:19.368077868Z" level=info msg="CreateContainer within sandbox \"7508f2fd04d9271872d0ab6099a24a1896823ad8e24419b84020b601d2e0df5e\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"32871adb48c2d57eeed6b49393889da43cd1673184a849d79fd8932fcf3f2fff\"" Dec 13 14:30:19.368885 env[1234]: time="2024-12-13T14:30:19.368848743Z" level=info msg="StartContainer for \"32871adb48c2d57eeed6b49393889da43cd1673184a849d79fd8932fcf3f2fff\"" Dec 13 14:30:19.370117 env[1234]: time="2024-12-13T14:30:19.369159021Z" level=info msg="CreateContainer within sandbox \"7b2f0122218789e232e00d465f74f8c3f7a0c574f7604ae5723b9b3ccb1dd01a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:30:19.386141 systemd[1]: Started cri-containerd-60e3c37b84bcc43fe0e691c79e42044e9bc574701834c280c6b4128022b3cf50.scope. Dec 13 14:30:19.399410 env[1234]: time="2024-12-13T14:30:19.399250231Z" level=info msg="CreateContainer within sandbox \"7b2f0122218789e232e00d465f74f8c3f7a0c574f7604ae5723b9b3ccb1dd01a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"b56125f93d7bd1e571557dc82262c8c2b9be31a834ab7c1508de1f9faa44b7ee\"" Dec 13 14:30:19.400652 env[1234]: time="2024-12-13T14:30:19.400587218Z" level=info msg="StartContainer for \"b56125f93d7bd1e571557dc82262c8c2b9be31a834ab7c1508de1f9faa44b7ee\"" Dec 13 14:30:19.412282 kubelet[1818]: W1213 14:30:19.411838 1818 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.128.0.53:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:19.412282 kubelet[1818]: E1213 14:30:19.411980 1818 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.53:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:19.435953 systemd[1]: Started cri-containerd-32871adb48c2d57eeed6b49393889da43cd1673184a849d79fd8932fcf3f2fff.scope. Dec 13 14:30:19.455439 systemd[1]: Started cri-containerd-b56125f93d7bd1e571557dc82262c8c2b9be31a834ab7c1508de1f9faa44b7ee.scope. Dec 13 14:30:19.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.463000 audit: BPF prog-id=70 op=LOAD Dec 13 14:30:19.463000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.463000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1870 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630653363333762383462636334336665306536393163373965343230 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1870 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630653363333762383462636334336665306536393163373965343230 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit: BPF prog-id=71 op=LOAD Dec 13 14:30:19.464000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0004509e0 items=0 ppid=1870 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630653363333762383462636334336665306536393163373965343230 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit: BPF prog-id=72 op=LOAD Dec 13 14:30:19.464000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000450a28 items=0 ppid=1870 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630653363333762383462636334336665306536393163373965343230 Dec 13 14:30:19.464000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:30:19.464000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.464000 audit: BPF prog-id=73 op=LOAD Dec 13 14:30:19.464000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000450e38 items=0 ppid=1870 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630653363333762383462636334336665306536393163373965343230 Dec 13 14:30:19.480710 kubelet[1818]: W1213 14:30:19.480550 1818 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.128.0.53:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:19.480944 kubelet[1818]: E1213 14:30:19.480750 1818 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.53:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:19.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.497000 audit: BPF prog-id=74 op=LOAD Dec 13 14:30:19.498000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.498000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1872 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332383731616462343863326435376565656436623439333933383839 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1872 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332383731616462343863326435376565656436623439333933383839 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.499000 audit: BPF prog-id=75 op=LOAD Dec 13 14:30:19.499000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028a6f0 items=0 ppid=1872 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332383731616462343863326435376565656436623439333933383839 Dec 13 14:30:19.500000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.500000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.500000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.500000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.500000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.500000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.500000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.500000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.500000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.500000 audit: BPF prog-id=76 op=LOAD Dec 13 14:30:19.500000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028a738 items=0 ppid=1872 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332383731616462343863326435376565656436623439333933383839 Dec 13 14:30:19.501000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:30:19.502000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:30:19.502000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.502000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.502000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.502000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.502000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.502000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.502000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.502000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.502000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.502000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.502000 audit: BPF prog-id=77 op=LOAD Dec 13 14:30:19.502000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028ab48 items=0 ppid=1872 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332383731616462343863326435376565656436623439333933383839 Dec 13 14:30:19.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit: BPF prog-id=78 op=LOAD Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1856 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363132356639336437626431653537313535376463383232363263 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1856 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363132356639336437626431653537313535376463383232363263 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit: BPF prog-id=79 op=LOAD Dec 13 14:30:19.514000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000355cf0 items=0 ppid=1856 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363132356639336437626431653537313535376463383232363263 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.514000 audit: BPF prog-id=80 op=LOAD Dec 13 14:30:19.514000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000355d38 items=0 ppid=1856 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363132356639336437626431653537313535376463383232363263 Dec 13 14:30:19.515000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:30:19.515000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:30:19.515000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.515000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.515000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.515000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.515000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.515000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.515000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.515000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.515000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.515000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:19.515000 audit: BPF prog-id=81 op=LOAD Dec 13 14:30:19.515000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da148 items=0 ppid=1856 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:19.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363132356639336437626431653537313535376463383232363263 Dec 13 14:30:19.559599 env[1234]: time="2024-12-13T14:30:19.559514219Z" level=info msg="StartContainer for \"60e3c37b84bcc43fe0e691c79e42044e9bc574701834c280c6b4128022b3cf50\" returns successfully" Dec 13 14:30:19.571957 kubelet[1818]: E1213 14:30:19.571889 1818 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.53:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.53:6443: connect: connection refused" interval="1.6s" Dec 13 14:30:19.633154 env[1234]: time="2024-12-13T14:30:19.633074355Z" level=info msg="StartContainer for \"32871adb48c2d57eeed6b49393889da43cd1673184a849d79fd8932fcf3f2fff\" returns successfully" Dec 13 14:30:19.635806 kubelet[1818]: W1213 14:30:19.635704 1818 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.128.0.53:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:19.635806 kubelet[1818]: E1213 14:30:19.635815 1818 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.53:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.53:6443: connect: connection refused Dec 13 14:30:19.639686 env[1234]: time="2024-12-13T14:30:19.639623697Z" level=info msg="StartContainer for \"b56125f93d7bd1e571557dc82262c8c2b9be31a834ab7c1508de1f9faa44b7ee\" returns successfully" Dec 13 14:30:19.693884 kubelet[1818]: I1213 14:30:19.693714 1818 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:19.694275 kubelet[1818]: E1213 14:30:19.694245 1818 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.53:6443/api/v1/nodes\": dial tcp 10.128.0.53:6443: connect: connection refused" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:20.737750 update_engine[1223]: I1213 14:30:20.736694 1223 update_attempter.cc:509] Updating boot flags... Dec 13 14:30:21.303567 kubelet[1818]: I1213 14:30:21.303516 1818 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:22.544679 kernel: kauditd_printk_skb: 559 callbacks suppressed Dec 13 14:30:22.544940 kernel: audit: type=1400 audit(1734100222.523:541): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:22.523000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:22.523000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00575c930 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:30:22.603662 kernel: audit: type=1300 audit(1734100222.523:541): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00575c930 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:30:22.523000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:30:22.642653 kernel: audit: type=1327 audit(1734100222.523:541): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:30:22.544000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:22.678651 kernel: audit: type=1400 audit(1734100222.544:542): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:22.544000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00575c990 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:30:22.745789 kernel: audit: type=1300 audit(1734100222.544:542): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00575c990 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:30:22.746007 kernel: audit: type=1327 audit(1734100222.544:542): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:30:22.544000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:30:22.773127 kernel: audit: type=1400 audit(1734100222.558:543): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:22.558000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:22.558000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0042d3200 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:30:22.807652 kernel: audit: type=1300 audit(1734100222.558:543): arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0042d3200 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:30:22.558000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:30:22.837660 kernel: audit: type=1327 audit(1734100222.558:543): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:30:22.837776 kernel: audit: type=1400 audit(1734100222.789:544): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:22.789000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:22.789000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c003d62360 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:30:22.789000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:30:22.799000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:22.799000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c003d62420 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:30:22.799000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:30:22.804000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:22.804000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c006abe420 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:30:22.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:30:23.136945 kubelet[1818]: I1213 14:30:23.136752 1818 apiserver.go:52] "Watching apiserver" Dec 13 14:30:23.177686 kubelet[1818]: E1213 14:30:23.177628 1818 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" not found" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:23.227922 kubelet[1818]: I1213 14:30:23.227877 1818 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:23.271240 kubelet[1818]: I1213 14:30:23.271192 1818 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:30:23.286819 kubelet[1818]: E1213 14:30:23.286756 1818 event.go:346] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal.1810c2f5f38896ff default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,UID:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,},FirstTimestamp:2024-12-13 14:30:18.146232063 +0000 UTC m=+1.041247179,LastTimestamp:2024-12-13 14:30:18.146232063 +0000 UTC m=+1.041247179,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal,}" Dec 13 14:30:23.436272 kubelet[1818]: E1213 14:30:23.436095 1818 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:23.836000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:23.836000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000079920 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:30:23.836000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:23.837000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:23.837000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001503a0 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:30:23.837000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:25.768092 systemd[1]: Reloading. Dec 13 14:30:25.895810 /usr/lib/systemd/system-generators/torcx-generator[2122]: time="2024-12-13T14:30:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:30:25.896992 /usr/lib/systemd/system-generators/torcx-generator[2122]: time="2024-12-13T14:30:25Z" level=info msg="torcx already run" Dec 13 14:30:25.995760 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:30:25.995785 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:30:26.020533 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:30:26.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.134000 audit: BPF prog-id=82 op=LOAD Dec 13 14:30:26.135000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit: BPF prog-id=83 op=LOAD Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.135000 audit: BPF prog-id=84 op=LOAD Dec 13 14:30:26.135000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:30:26.135000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:30:26.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.137000 audit: BPF prog-id=85 op=LOAD Dec 13 14:30:26.137000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:30:26.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.138000 audit: BPF prog-id=86 op=LOAD Dec 13 14:30:26.138000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:30:26.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.141000 audit: BPF prog-id=87 op=LOAD Dec 13 14:30:26.141000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit: BPF prog-id=88 op=LOAD Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.143000 audit: BPF prog-id=89 op=LOAD Dec 13 14:30:26.143000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:30:26.143000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:30:26.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit: BPF prog-id=90 op=LOAD Dec 13 14:30:26.145000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit: BPF prog-id=91 op=LOAD Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.145000 audit: BPF prog-id=92 op=LOAD Dec 13 14:30:26.145000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:30:26.145000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:30:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.146000 audit: BPF prog-id=93 op=LOAD Dec 13 14:30:26.146000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.147000 audit: BPF prog-id=94 op=LOAD Dec 13 14:30:26.147000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:30:26.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit: BPF prog-id=95 op=LOAD Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.148000 audit: BPF prog-id=96 op=LOAD Dec 13 14:30:26.148000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:30:26.148000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:30:26.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.149000 audit: BPF prog-id=97 op=LOAD Dec 13 14:30:26.149000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:30:26.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit: BPF prog-id=98 op=LOAD Dec 13 14:30:26.153000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.154000 audit: BPF prog-id=99 op=LOAD Dec 13 14:30:26.154000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:30:26.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.156000 audit: BPF prog-id=100 op=LOAD Dec 13 14:30:26.156000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:30:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.157000 audit: BPF prog-id=101 op=LOAD Dec 13 14:30:26.157000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:30:26.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.159000 audit: BPF prog-id=102 op=LOAD Dec 13 14:30:26.159000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:30:26.183657 kubelet[1818]: I1213 14:30:26.183572 1818 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:30:26.186770 systemd[1]: Stopping kubelet.service... Dec 13 14:30:26.206077 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:30:26.206379 systemd[1]: Stopped kubelet.service. Dec 13 14:30:26.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:26.206483 systemd[1]: kubelet.service: Consumed 1.611s CPU time. Dec 13 14:30:26.209026 systemd[1]: Starting kubelet.service... Dec 13 14:30:26.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:26.420004 systemd[1]: Started kubelet.service. Dec 13 14:30:26.541090 kubelet[2167]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:30:26.542153 kubelet[2167]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:30:26.542355 kubelet[2167]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:30:26.542651 kubelet[2167]: I1213 14:30:26.542573 2167 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:30:26.573360 kubelet[2167]: I1213 14:30:26.573269 2167 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:30:26.573360 kubelet[2167]: I1213 14:30:26.573318 2167 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:30:26.574065 kubelet[2167]: I1213 14:30:26.573878 2167 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:30:26.577099 kubelet[2167]: I1213 14:30:26.577058 2167 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:30:26.580823 kubelet[2167]: I1213 14:30:26.580765 2167 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:30:26.601667 kubelet[2167]: I1213 14:30:26.601313 2167 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:30:26.601970 kubelet[2167]: I1213 14:30:26.601931 2167 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:30:26.603673 kubelet[2167]: I1213 14:30:26.602367 2167 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:30:26.603673 kubelet[2167]: I1213 14:30:26.602424 2167 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:30:26.603673 kubelet[2167]: I1213 14:30:26.602444 2167 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:30:26.603673 kubelet[2167]: I1213 14:30:26.602517 2167 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:30:26.603673 kubelet[2167]: I1213 14:30:26.602762 2167 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:30:26.603673 kubelet[2167]: I1213 14:30:26.602791 2167 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:30:26.603673 kubelet[2167]: I1213 14:30:26.602853 2167 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:30:26.604214 kubelet[2167]: I1213 14:30:26.602907 2167 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:30:26.610435 kubelet[2167]: I1213 14:30:26.609273 2167 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:30:26.610435 kubelet[2167]: I1213 14:30:26.609677 2167 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:30:26.612952 kubelet[2167]: I1213 14:30:26.612884 2167 server.go:1256] "Started kubelet" Dec 13 14:30:26.629000 audit[2167]: AVC avc: denied { mac_admin } for pid=2167 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.629000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:26.629000 audit[2167]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009fdb90 a1=c000a55098 a2=c0009fdb60 a3=25 items=0 ppid=1 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:26.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:26.629000 audit[2167]: AVC avc: denied { mac_admin } for pid=2167 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.629000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:26.629000 audit[2167]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c0a640 a1=c000a550b0 a2=c0009fdc20 a3=25 items=0 ppid=1 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:26.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:26.632482 kubelet[2167]: I1213 14:30:26.630556 2167 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:30:26.632482 kubelet[2167]: I1213 14:30:26.630646 2167 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:30:26.632482 kubelet[2167]: I1213 14:30:26.630701 2167 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:30:26.650297 kubelet[2167]: I1213 14:30:26.649897 2167 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:30:26.652283 kubelet[2167]: I1213 14:30:26.651530 2167 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:30:26.653963 kubelet[2167]: I1213 14:30:26.653903 2167 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:30:26.654237 kubelet[2167]: I1213 14:30:26.654210 2167 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:30:26.664021 kubelet[2167]: I1213 14:30:26.663457 2167 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:30:26.670834 kubelet[2167]: I1213 14:30:26.670363 2167 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:30:26.671372 kubelet[2167]: I1213 14:30:26.671319 2167 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:30:26.681702 kubelet[2167]: I1213 14:30:26.680923 2167 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:30:26.692160 kubelet[2167]: I1213 14:30:26.692123 2167 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:30:26.692370 kubelet[2167]: I1213 14:30:26.692178 2167 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:30:26.692370 kubelet[2167]: I1213 14:30:26.692207 2167 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:30:26.692370 kubelet[2167]: E1213 14:30:26.692330 2167 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:30:26.697904 kubelet[2167]: I1213 14:30:26.697867 2167 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:30:26.698208 kubelet[2167]: I1213 14:30:26.698183 2167 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:30:26.704923 kubelet[2167]: E1213 14:30:26.704897 2167 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:30:26.709113 kubelet[2167]: I1213 14:30:26.709089 2167 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:30:26.779148 kubelet[2167]: I1213 14:30:26.779059 2167 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:26.793686 kubelet[2167]: E1213 14:30:26.793040 2167 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:30:26.803349 kubelet[2167]: I1213 14:30:26.798768 2167 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:26.803349 kubelet[2167]: I1213 14:30:26.798870 2167 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:26.805593 kubelet[2167]: I1213 14:30:26.804562 2167 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:30:26.805593 kubelet[2167]: I1213 14:30:26.804590 2167 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:30:26.805593 kubelet[2167]: I1213 14:30:26.804641 2167 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:30:26.805593 kubelet[2167]: I1213 14:30:26.804889 2167 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:30:26.805593 kubelet[2167]: I1213 14:30:26.804924 2167 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:30:26.805593 kubelet[2167]: I1213 14:30:26.804936 2167 policy_none.go:49] "None policy: Start" Dec 13 14:30:26.812306 kubelet[2167]: I1213 14:30:26.812246 2167 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:30:26.812306 kubelet[2167]: I1213 14:30:26.812290 2167 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:30:26.812558 kubelet[2167]: I1213 14:30:26.812536 2167 state_mem.go:75] "Updated machine memory state" Dec 13 14:30:26.823492 kubelet[2167]: I1213 14:30:26.823428 2167 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:30:26.822000 audit[2167]: AVC avc: denied { mac_admin } for pid=2167 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:26.822000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:26.822000 audit[2167]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010669f0 a1=c000ff36c8 a2=c0010669c0 a3=25 items=0 ppid=1 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:26.822000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:26.824082 kubelet[2167]: I1213 14:30:26.823583 2167 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:30:26.827692 kubelet[2167]: I1213 14:30:26.827656 2167 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:30:26.993950 kubelet[2167]: I1213 14:30:26.993858 2167 topology_manager.go:215] "Topology Admit Handler" podUID="2815d1718299a25efdb922a2fbd2efbc" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:26.994203 kubelet[2167]: I1213 14:30:26.994034 2167 topology_manager.go:215] "Topology Admit Handler" podUID="e4b1bc99a76c612c509f831def026945" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:26.994203 kubelet[2167]: I1213 14:30:26.994088 2167 topology_manager.go:215] "Topology Admit Handler" podUID="f42d661239ddcae8205bf16e03e345b4" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:27.004053 kubelet[2167]: W1213 14:30:27.004012 2167 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:30:27.005771 kubelet[2167]: W1213 14:30:27.005743 2167 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:30:27.008235 kubelet[2167]: W1213 14:30:27.008194 2167 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Dec 13 14:30:27.077369 kubelet[2167]: I1213 14:30:27.077287 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2815d1718299a25efdb922a2fbd2efbc-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"2815d1718299a25efdb922a2fbd2efbc\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:27.077825 kubelet[2167]: I1213 14:30:27.077793 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/2815d1718299a25efdb922a2fbd2efbc-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"2815d1718299a25efdb922a2fbd2efbc\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:27.077979 kubelet[2167]: I1213 14:30:27.077854 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2815d1718299a25efdb922a2fbd2efbc-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"2815d1718299a25efdb922a2fbd2efbc\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:27.077979 kubelet[2167]: I1213 14:30:27.077895 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2815d1718299a25efdb922a2fbd2efbc-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"2815d1718299a25efdb922a2fbd2efbc\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:27.077979 kubelet[2167]: I1213 14:30:27.077949 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2815d1718299a25efdb922a2fbd2efbc-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"2815d1718299a25efdb922a2fbd2efbc\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:27.078180 kubelet[2167]: I1213 14:30:27.077990 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e4b1bc99a76c612c509f831def026945-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"e4b1bc99a76c612c509f831def026945\") " pod="kube-system/kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:27.078180 kubelet[2167]: I1213 14:30:27.078034 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f42d661239ddcae8205bf16e03e345b4-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"f42d661239ddcae8205bf16e03e345b4\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:27.078180 kubelet[2167]: I1213 14:30:27.078073 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f42d661239ddcae8205bf16e03e345b4-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"f42d661239ddcae8205bf16e03e345b4\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:27.078180 kubelet[2167]: I1213 14:30:27.078115 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f42d661239ddcae8205bf16e03e345b4-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" (UID: \"f42d661239ddcae8205bf16e03e345b4\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:30:27.088000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:27.088000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c830a0 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:30:27.088000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:27.089000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:27.089000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c83260 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:30:27.089000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:27.089000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:27.089000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c83420 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:30:27.089000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:27.091000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:27.091000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d0daa0 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:30:27.091000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:27.604084 kubelet[2167]: I1213 14:30:27.604020 2167 apiserver.go:52] "Watching apiserver" Dec 13 14:30:27.671433 kubelet[2167]: I1213 14:30:27.671375 2167 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:30:27.927146 kubelet[2167]: I1213 14:30:27.926978 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" podStartSLOduration=1.926852214 podStartE2EDuration="1.926852214s" podCreationTimestamp="2024-12-13 14:30:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:30:27.921998652 +0000 UTC m=+1.491770328" watchObservedRunningTime="2024-12-13 14:30:27.926852214 +0000 UTC m=+1.496623870" Dec 13 14:30:27.952406 kubelet[2167]: I1213 14:30:27.952343 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" podStartSLOduration=1.952257113 podStartE2EDuration="1.952257113s" podCreationTimestamp="2024-12-13 14:30:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:30:27.951657989 +0000 UTC m=+1.521429671" watchObservedRunningTime="2024-12-13 14:30:27.952257113 +0000 UTC m=+1.522028793" Dec 13 14:30:28.027311 kubelet[2167]: I1213 14:30:28.027225 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" podStartSLOduration=2.027135211 podStartE2EDuration="2.027135211s" podCreationTimestamp="2024-12-13 14:30:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:30:27.97903093 +0000 UTC m=+1.548802610" watchObservedRunningTime="2024-12-13 14:30:28.027135211 +0000 UTC m=+1.596906891" Dec 13 14:30:28.640000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:30:28.649162 kernel: kauditd_printk_skb: 284 callbacks suppressed Dec 13 14:30:28.649369 kernel: audit: type=1400 audit(1734100228.640:802): avc: denied { watch } for pid=2034 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:30:28.640000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00107ba80 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:30:28.724775 kernel: audit: type=1300 audit(1734100228.640:802): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00107ba80 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:30:28.640000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:28.756653 kernel: audit: type=1327 audit(1734100228.640:802): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:32.873583 sudo[1480]: pam_unix(sudo:session): session closed for user root Dec 13 14:30:32.872000 audit[1480]: USER_END pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.899640 kernel: audit: type=1106 audit(1734100232.872:803): pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.899817 kernel: audit: type=1104 audit(1734100232.872:804): pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.872000 audit[1480]: CRED_DISP pid=1480 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.927709 sshd[1477]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:32.928000 audit[1477]: USER_END pid=1477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:30:32.934376 systemd[1]: sshd@9-10.128.0.53:22-139.178.68.195:56156.service: Deactivated successfully. Dec 13 14:30:32.935832 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:30:32.936077 systemd[1]: session-9.scope: Consumed 7.905s CPU time. Dec 13 14:30:32.938100 systemd-logind[1218]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:30:32.940131 systemd-logind[1218]: Removed session 9. Dec 13 14:30:32.928000 audit[1477]: CRED_DISP pid=1477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:30:32.986642 kernel: audit: type=1106 audit(1734100232.928:805): pid=1477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:30:32.986763 kernel: audit: type=1104 audit(1734100232.928:806): pid=1477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:30:32.986833 kernel: audit: type=1131 audit(1734100232.933:807): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.53:22-139.178.68.195:56156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:32.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.53:22-139.178.68.195:56156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:40.420926 kubelet[2167]: I1213 14:30:40.420862 2167 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:30:40.421654 env[1234]: time="2024-12-13T14:30:40.421479227Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:30:40.422460 kubelet[2167]: I1213 14:30:40.422418 2167 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:30:40.515490 kubelet[2167]: I1213 14:30:40.515418 2167 topology_manager.go:215] "Topology Admit Handler" podUID="5843497b-8a3b-4c37-bd88-87c5d87dcead" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-wkgbh" Dec 13 14:30:40.523937 systemd[1]: Created slice kubepods-besteffort-pod5843497b_8a3b_4c37_bd88_87c5d87dcead.slice. Dec 13 14:30:40.572923 kubelet[2167]: I1213 14:30:40.572871 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5843497b-8a3b-4c37-bd88-87c5d87dcead-var-lib-calico\") pod \"tigera-operator-c7ccbd65-wkgbh\" (UID: \"5843497b-8a3b-4c37-bd88-87c5d87dcead\") " pod="tigera-operator/tigera-operator-c7ccbd65-wkgbh" Dec 13 14:30:40.573347 kubelet[2167]: I1213 14:30:40.573325 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qn9cb\" (UniqueName: \"kubernetes.io/projected/5843497b-8a3b-4c37-bd88-87c5d87dcead-kube-api-access-qn9cb\") pod \"tigera-operator-c7ccbd65-wkgbh\" (UID: \"5843497b-8a3b-4c37-bd88-87c5d87dcead\") " pod="tigera-operator/tigera-operator-c7ccbd65-wkgbh" Dec 13 14:30:40.576306 kubelet[2167]: I1213 14:30:40.576268 2167 topology_manager.go:215] "Topology Admit Handler" podUID="1975b3c0-5301-4174-995f-c6a522c41645" podNamespace="kube-system" podName="kube-proxy-wvdcp" Dec 13 14:30:40.585103 systemd[1]: Created slice kubepods-besteffort-pod1975b3c0_5301_4174_995f_c6a522c41645.slice. Dec 13 14:30:40.589603 kubelet[2167]: W1213 14:30:40.589555 2167 reflector.go:539] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' and this object Dec 13 14:30:40.592651 kubelet[2167]: E1213 14:30:40.592602 2167 reflector.go:147] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' and this object Dec 13 14:30:40.592838 kubelet[2167]: W1213 14:30:40.589871 2167 reflector.go:539] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' and this object Dec 13 14:30:40.592964 kubelet[2167]: E1213 14:30:40.592942 2167 reflector.go:147] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' and this object Dec 13 14:30:40.674108 kubelet[2167]: I1213 14:30:40.673924 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1975b3c0-5301-4174-995f-c6a522c41645-lib-modules\") pod \"kube-proxy-wvdcp\" (UID: \"1975b3c0-5301-4174-995f-c6a522c41645\") " pod="kube-system/kube-proxy-wvdcp" Dec 13 14:30:40.674108 kubelet[2167]: I1213 14:30:40.674082 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1975b3c0-5301-4174-995f-c6a522c41645-kube-proxy\") pod \"kube-proxy-wvdcp\" (UID: \"1975b3c0-5301-4174-995f-c6a522c41645\") " pod="kube-system/kube-proxy-wvdcp" Dec 13 14:30:40.674418 kubelet[2167]: I1213 14:30:40.674150 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1975b3c0-5301-4174-995f-c6a522c41645-xtables-lock\") pod \"kube-proxy-wvdcp\" (UID: \"1975b3c0-5301-4174-995f-c6a522c41645\") " pod="kube-system/kube-proxy-wvdcp" Dec 13 14:30:40.674418 kubelet[2167]: I1213 14:30:40.674183 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vqzd8\" (UniqueName: \"kubernetes.io/projected/1975b3c0-5301-4174-995f-c6a522c41645-kube-api-access-vqzd8\") pod \"kube-proxy-wvdcp\" (UID: \"1975b3c0-5301-4174-995f-c6a522c41645\") " pod="kube-system/kube-proxy-wvdcp" Dec 13 14:30:40.834548 env[1234]: time="2024-12-13T14:30:40.834476615Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-wkgbh,Uid:5843497b-8a3b-4c37-bd88-87c5d87dcead,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:30:40.868113 env[1234]: time="2024-12-13T14:30:40.868014410Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:40.868347 env[1234]: time="2024-12-13T14:30:40.868124719Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:40.868347 env[1234]: time="2024-12-13T14:30:40.868161693Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:40.869102 env[1234]: time="2024-12-13T14:30:40.868493631Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fcae96738969216cf3f080de9c183c0cbd6de445d9420f4181a4569fe357835b pid=2251 runtime=io.containerd.runc.v2 Dec 13 14:30:40.917943 systemd[1]: run-containerd-runc-k8s.io-fcae96738969216cf3f080de9c183c0cbd6de445d9420f4181a4569fe357835b-runc.Z5L6qr.mount: Deactivated successfully. Dec 13 14:30:40.927098 systemd[1]: Started cri-containerd-fcae96738969216cf3f080de9c183c0cbd6de445d9420f4181a4569fe357835b.scope. Dec 13 14:30:40.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.973679 kernel: audit: type=1400 audit(1734100240.950:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:41.000905 kernel: audit: type=1400 audit(1734100240.950:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:41.024848 kernel: audit: type=1400 audit(1734100240.950:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:41.046965 kernel: audit: type=1400 audit(1734100240.950:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:41.069806 env[1234]: time="2024-12-13T14:30:41.069734078Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-wkgbh,Uid:5843497b-8a3b-4c37-bd88-87c5d87dcead,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"fcae96738969216cf3f080de9c183c0cbd6de445d9420f4181a4569fe357835b\"" Dec 13 14:30:40.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:41.073461 env[1234]: time="2024-12-13T14:30:41.073417431Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:30:41.092166 kernel: audit: type=1400 audit(1734100240.950:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:41.092430 kernel: audit: type=1400 audit(1734100240.950:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:41.102057 kernel: audit: type=1400 audit(1734100240.950:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:41.134144 kernel: audit: type=1400 audit(1734100240.950:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:41.154864 kernel: audit: type=1400 audit(1734100240.950:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:41.155156 kernel: audit: type=1400 audit(1734100240.951:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.951000 audit: BPF prog-id=103 op=LOAD Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2251 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:40.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663616539363733383936393231366366336630383064653963313833 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2251 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:40.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663616539363733383936393231366366336630383064653963313833 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.964000 audit: BPF prog-id=104 op=LOAD Dec 13 14:30:40.964000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00036ab10 items=0 ppid=2251 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:40.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663616539363733383936393231366366336630383064653963313833 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit: BPF prog-id=105 op=LOAD Dec 13 14:30:40.972000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00036ab58 items=0 ppid=2251 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:40.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663616539363733383936393231366366336630383064653963313833 Dec 13 14:30:40.972000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:30:40.972000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:40.972000 audit: BPF prog-id=106 op=LOAD Dec 13 14:30:40.972000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00036af68 items=0 ppid=2251 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:40.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663616539363733383936393231366366336630383064653963313833 Dec 13 14:30:41.783078 kubelet[2167]: E1213 14:30:41.782995 2167 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:30:41.783078 kubelet[2167]: E1213 14:30:41.783081 2167 projected.go:200] Error preparing data for projected volume kube-api-access-vqzd8 for pod kube-system/kube-proxy-wvdcp: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:30:41.783970 kubelet[2167]: E1213 14:30:41.783217 2167 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/1975b3c0-5301-4174-995f-c6a522c41645-kube-api-access-vqzd8 podName:1975b3c0-5301-4174-995f-c6a522c41645 nodeName:}" failed. No retries permitted until 2024-12-13 14:30:42.283179144 +0000 UTC m=+15.852950817 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-vqzd8" (UniqueName: "kubernetes.io/projected/1975b3c0-5301-4174-995f-c6a522c41645-kube-api-access-vqzd8") pod "kube-proxy-wvdcp" (UID: "1975b3c0-5301-4174-995f-c6a522c41645") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:30:42.394404 env[1234]: time="2024-12-13T14:30:42.394325218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wvdcp,Uid:1975b3c0-5301-4174-995f-c6a522c41645,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:42.426439 env[1234]: time="2024-12-13T14:30:42.426311439Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:42.426439 env[1234]: time="2024-12-13T14:30:42.426372077Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:42.426439 env[1234]: time="2024-12-13T14:30:42.426391491Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:42.427599 env[1234]: time="2024-12-13T14:30:42.426994990Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/44fa0404a28105b975af7f83ea445227a949e3e322c27e903b2109781cb11ae7 pid=2294 runtime=io.containerd.runc.v2 Dec 13 14:30:42.462253 systemd[1]: run-containerd-runc-k8s.io-44fa0404a28105b975af7f83ea445227a949e3e322c27e903b2109781cb11ae7-runc.gQwgte.mount: Deactivated successfully. Dec 13 14:30:42.473224 systemd[1]: Started cri-containerd-44fa0404a28105b975af7f83ea445227a949e3e322c27e903b2109781cb11ae7.scope. Dec 13 14:30:42.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.492000 audit: BPF prog-id=107 op=LOAD Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2294 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666130343034613238313035623937356166376638336561343435 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2294 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666130343034613238313035623937356166376638336561343435 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.493000 audit: BPF prog-id=108 op=LOAD Dec 13 14:30:42.493000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000916e0 items=0 ppid=2294 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666130343034613238313035623937356166376638336561343435 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit: BPF prog-id=109 op=LOAD Dec 13 14:30:42.494000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000091728 items=0 ppid=2294 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666130343034613238313035623937356166376638336561343435 Dec 13 14:30:42.494000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:30:42.494000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { perfmon } for pid=2305 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit[2305]: AVC avc: denied { bpf } for pid=2305 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.494000 audit: BPF prog-id=110 op=LOAD Dec 13 14:30:42.494000 audit[2305]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000091b38 items=0 ppid=2294 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434666130343034613238313035623937356166376638336561343435 Dec 13 14:30:42.518897 env[1234]: time="2024-12-13T14:30:42.518814088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wvdcp,Uid:1975b3c0-5301-4174-995f-c6a522c41645,Namespace:kube-system,Attempt:0,} returns sandbox id \"44fa0404a28105b975af7f83ea445227a949e3e322c27e903b2109781cb11ae7\"" Dec 13 14:30:42.524434 env[1234]: time="2024-12-13T14:30:42.524372552Z" level=info msg="CreateContainer within sandbox \"44fa0404a28105b975af7f83ea445227a949e3e322c27e903b2109781cb11ae7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:30:42.544781 env[1234]: time="2024-12-13T14:30:42.544723814Z" level=info msg="CreateContainer within sandbox \"44fa0404a28105b975af7f83ea445227a949e3e322c27e903b2109781cb11ae7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d6128996eebc7fb5f52187a466b53e57576803d0921d3bdff13ca3f67e662a2d\"" Dec 13 14:30:42.547037 env[1234]: time="2024-12-13T14:30:42.546988612Z" level=info msg="StartContainer for \"d6128996eebc7fb5f52187a466b53e57576803d0921d3bdff13ca3f67e662a2d\"" Dec 13 14:30:42.576139 systemd[1]: Started cri-containerd-d6128996eebc7fb5f52187a466b53e57576803d0921d3bdff13ca3f67e662a2d.scope. Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fc44e23cc28 items=0 ppid=2294 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313238393936656562633766623566353231383761343636623533 Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.610000 audit: BPF prog-id=111 op=LOAD Dec 13 14:30:42.610000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0001b6d78 items=0 ppid=2294 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313238393936656562633766623566353231383761343636623533 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit: BPF prog-id=112 op=LOAD Dec 13 14:30:42.611000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0001b6dc8 items=0 ppid=2294 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313238393936656562633766623566353231383761343636623533 Dec 13 14:30:42.611000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:30:42.611000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.611000 audit: BPF prog-id=113 op=LOAD Dec 13 14:30:42.611000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0001b6e58 items=0 ppid=2294 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313238393936656562633766623566353231383761343636623533 Dec 13 14:30:42.639729 env[1234]: time="2024-12-13T14:30:42.639652413Z" level=info msg="StartContainer for \"d6128996eebc7fb5f52187a466b53e57576803d0921d3bdff13ca3f67e662a2d\" returns successfully" Dec 13 14:30:42.735000 audit[2390]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.735000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb4092800 a2=0 a3=7ffdb40927ec items=0 ppid=2350 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:30:42.737000 audit[2391]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:42.737000 audit[2392]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.737000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebff33240 a2=0 a3=96ebdba528e77d0a items=0 ppid=2350 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:30:42.737000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2a6113a0 a2=0 a3=7fff2a61138c items=0 ppid=2350 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:30:42.739000 audit[2393]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.739000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd53130b50 a2=0 a3=7ffd53130b3c items=0 ppid=2350 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:30:42.741000 audit[2394]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:42.741000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff06b33e00 a2=0 a3=7fff06b33dec items=0 ppid=2350 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:30:42.744000 audit[2395]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:42.744000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7c7ac0e0 a2=0 a3=7ffc7c7ac0cc items=0 ppid=2350 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:30:42.843000 audit[2396]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.843000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc2357f710 a2=0 a3=7ffc2357f6fc items=0 ppid=2350 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:30:42.848000 audit[2398]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.848000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcaff49b00 a2=0 a3=7ffcaff49aec items=0 ppid=2350 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:30:42.857000 audit[2401]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.857000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffed8e2b8e0 a2=0 a3=7ffed8e2b8cc items=0 ppid=2350 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:30:42.860000 audit[2402]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.860000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd620208f0 a2=0 a3=7ffd620208dc items=0 ppid=2350 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:30:42.872000 audit[2404]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.872000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd12b02fd0 a2=0 a3=7ffd12b02fbc items=0 ppid=2350 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:30:42.875000 audit[2405]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.875000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3df6e4b0 a2=0 a3=7fff3df6e49c items=0 ppid=2350 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:30:42.880000 audit[2407]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.880000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe727d7620 a2=0 a3=7ffe727d760c items=0 ppid=2350 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:30:42.888000 audit[2410]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.888000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff48d0a9c0 a2=0 a3=7fff48d0a9ac items=0 ppid=2350 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:30:42.890000 audit[2411]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.890000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5f068fc0 a2=0 a3=7ffc5f068fac items=0 ppid=2350 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:30:42.894000 audit[2413]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.894000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe678450d0 a2=0 a3=7ffe678450bc items=0 ppid=2350 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:30:42.896000 audit[2414]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.896000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbb8c6290 a2=0 a3=7ffdbb8c627c items=0 ppid=2350 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:30:42.901000 audit[2416]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.901000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0fef7fd0 a2=0 a3=7ffc0fef7fbc items=0 ppid=2350 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:30:42.906000 audit[2419]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.906000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc714b9c10 a2=0 a3=7ffc714b9bfc items=0 ppid=2350 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:30:42.913000 audit[2422]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.913000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccd727420 a2=0 a3=7ffccd72740c items=0 ppid=2350 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:30:42.915000 audit[2423]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.915000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdb07dc940 a2=0 a3=7ffdb07dc92c items=0 ppid=2350 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:30:42.919000 audit[2425]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.919000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffff33efb80 a2=0 a3=7ffff33efb6c items=0 ppid=2350 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:42.924000 audit[2428]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.924000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4fd80300 a2=0 a3=7ffd4fd802ec items=0 ppid=2350 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.924000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:42.926000 audit[2429]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.926000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1f916b40 a2=0 a3=7ffc1f916b2c items=0 ppid=2350 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.926000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:30:42.930000 audit[2431]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:42.930000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff56a98490 a2=0 a3=7fff56a9847c items=0 ppid=2350 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.930000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:30:42.965000 audit[2437]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:42.965000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffeba24b090 a2=0 a3=7ffeba24b07c items=0 ppid=2350 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.965000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:42.976000 audit[2437]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:42.976000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffeba24b090 a2=0 a3=7ffeba24b07c items=0 ppid=2350 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:42.979000 audit[2443]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:42.979000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffca7e2d20 a2=0 a3=7fffca7e2d0c items=0 ppid=2350 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:30:42.984000 audit[2445]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:42.984000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd1ed10b60 a2=0 a3=7ffd1ed10b4c items=0 ppid=2350 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:30:42.992000 audit[2448]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:42.992000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe746ad6b0 a2=0 a3=7ffe746ad69c items=0 ppid=2350 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:30:42.994000 audit[2449]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:42.994000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa6e18de0 a2=0 a3=7fffa6e18dcc items=0 ppid=2350 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:30:42.998000 audit[2451]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:42.998000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea3cf8cc0 a2=0 a3=7ffea3cf8cac items=0 ppid=2350 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:30:43.000000 audit[2452]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.000000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbfe26430 a2=0 a3=7fffbfe2641c items=0 ppid=2350 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:30:43.004000 audit[2454]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.004000 audit[2454]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc0c4be6e0 a2=0 a3=7ffc0c4be6cc items=0 ppid=2350 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.004000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:30:43.009000 audit[2457]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2457 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.009000 audit[2457]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffef76d37e0 a2=0 a3=7ffef76d37cc items=0 ppid=2350 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:30:43.011000 audit[2458]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.011000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc98a74ee0 a2=0 a3=7ffc98a74ecc items=0 ppid=2350 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:30:43.016000 audit[2460]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.016000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd294a790 a2=0 a3=7ffcd294a77c items=0 ppid=2350 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:30:43.018000 audit[2461]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2461 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.018000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd09d2e8a0 a2=0 a3=7ffd09d2e88c items=0 ppid=2350 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:30:43.022000 audit[2463]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2463 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.022000 audit[2463]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2b00d9e0 a2=0 a3=7fff2b00d9cc items=0 ppid=2350 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:30:43.028000 audit[2466]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.028000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb79d87c0 a2=0 a3=7fffb79d87ac items=0 ppid=2350 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:30:43.033000 audit[2469]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.033000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd7f36fa0 a2=0 a3=7ffcd7f36f8c items=0 ppid=2350 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:30:43.035000 audit[2470]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.035000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdecbafe10 a2=0 a3=7ffdecbafdfc items=0 ppid=2350 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:30:43.039000 audit[2472]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.039000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe7e948ba0 a2=0 a3=7ffe7e948b8c items=0 ppid=2350 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:43.044000 audit[2475]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.044000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd9dd98cc0 a2=0 a3=7ffd9dd98cac items=0 ppid=2350 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:43.047000 audit[2476]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.047000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce2134f00 a2=0 a3=7ffce2134eec items=0 ppid=2350 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:30:43.052000 audit[2478]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.052000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcf499b690 a2=0 a3=7ffcf499b67c items=0 ppid=2350 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:30:43.054000 audit[2479]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.054000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc462e4550 a2=0 a3=7ffc462e453c items=0 ppid=2350 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:30:43.058000 audit[2481]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.058000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc265aa20 a2=0 a3=7fffc265aa0c items=0 ppid=2350 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:43.065000 audit[2484]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:43.065000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdbc403510 a2=0 a3=7ffdbc4034fc items=0 ppid=2350 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:43.070000 audit[2486]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:30:43.070000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fffca8b2b10 a2=0 a3=7fffca8b2afc items=0 ppid=2350 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.070000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:43.071000 audit[2486]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:30:43.071000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffca8b2b10 a2=0 a3=7fffca8b2afc items=0 ppid=2350 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:43.071000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:47.744385 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1924043005.mount: Deactivated successfully. Dec 13 14:30:48.799588 env[1234]: time="2024-12-13T14:30:48.799489533Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:48.803140 env[1234]: time="2024-12-13T14:30:48.803087687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:48.805284 env[1234]: time="2024-12-13T14:30:48.805244178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:48.807501 env[1234]: time="2024-12-13T14:30:48.807463834Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:48.808325 env[1234]: time="2024-12-13T14:30:48.808269587Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:30:48.813553 env[1234]: time="2024-12-13T14:30:48.813495488Z" level=info msg="CreateContainer within sandbox \"fcae96738969216cf3f080de9c183c0cbd6de445d9420f4181a4569fe357835b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:30:48.837399 env[1234]: time="2024-12-13T14:30:48.837333268Z" level=info msg="CreateContainer within sandbox \"fcae96738969216cf3f080de9c183c0cbd6de445d9420f4181a4569fe357835b\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"78c32bd98b7acbfccf3f30e4260d8211e1444fd6862b5548a7241d23d2d93ce5\"" Dec 13 14:30:48.840324 env[1234]: time="2024-12-13T14:30:48.840215615Z" level=info msg="StartContainer for \"78c32bd98b7acbfccf3f30e4260d8211e1444fd6862b5548a7241d23d2d93ce5\"" Dec 13 14:30:48.895528 systemd[1]: Started cri-containerd-78c32bd98b7acbfccf3f30e4260d8211e1444fd6862b5548a7241d23d2d93ce5.scope. Dec 13 14:30:48.942582 kernel: kauditd_printk_skb: 300 callbacks suppressed Dec 13 14:30:48.942824 kernel: audit: type=1400 audit(1734100248.915:901): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984731 kernel: audit: type=1400 audit(1734100248.916:902): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984954 kernel: audit: type=1400 audit(1734100248.916:903): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:49.006383 kernel: audit: type=1400 audit(1734100248.916:904): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:49.027860 kernel: audit: type=1400 audit(1734100248.916:905): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:49.028056 kernel: audit: type=1400 audit(1734100248.916:906): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:49.069672 kernel: audit: type=1400 audit(1734100248.916:907): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:49.069966 kernel: audit: type=1400 audit(1734100248.916:908): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:49.111783 kernel: audit: type=1400 audit(1734100248.916:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:49.136417 kernel: audit: type=1400 audit(1734100248.942:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.942000 audit: BPF prog-id=114 op=LOAD Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2251 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:48.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738633332626439386237616362666363663366333065343236306438 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2251 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:48.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738633332626439386237616362666363663366333065343236306438 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.943000 audit: BPF prog-id=115 op=LOAD Dec 13 14:30:48.943000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002825c0 items=0 ppid=2251 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:48.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738633332626439386237616362666363663366333065343236306438 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit: BPF prog-id=116 op=LOAD Dec 13 14:30:48.984000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000219e98 items=0 ppid=2251 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:48.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738633332626439386237616362666363663366333065343236306438 Dec 13 14:30:48.984000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:30:48.984000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:48.984000 audit: BPF prog-id=117 op=LOAD Dec 13 14:30:48.984000 audit[2496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0004162a8 items=0 ppid=2251 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:48.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738633332626439386237616362666363663366333065343236306438 Dec 13 14:30:49.149819 env[1234]: time="2024-12-13T14:30:49.149742783Z" level=info msg="StartContainer for \"78c32bd98b7acbfccf3f30e4260d8211e1444fd6862b5548a7241d23d2d93ce5\" returns successfully" Dec 13 14:30:49.832293 kubelet[2167]: I1213 14:30:49.832036 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wvdcp" podStartSLOduration=9.831945778 podStartE2EDuration="9.831945778s" podCreationTimestamp="2024-12-13 14:30:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:30:42.81100612 +0000 UTC m=+16.380777801" watchObservedRunningTime="2024-12-13 14:30:49.831945778 +0000 UTC m=+23.401717458" Dec 13 14:30:52.448000 audit[2535]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2535 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:52.448000 audit[2535]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff8ce2c5e0 a2=0 a3=7fff8ce2c5cc items=0 ppid=2350 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:52.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:52.455000 audit[2535]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2535 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:52.455000 audit[2535]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff8ce2c5e0 a2=0 a3=0 items=0 ppid=2350 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:52.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:52.496000 audit[2537]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:52.496000 audit[2537]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffca4ee1650 a2=0 a3=7ffca4ee163c items=0 ppid=2350 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:52.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:52.504000 audit[2537]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2537 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:52.504000 audit[2537]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffca4ee1650 a2=0 a3=0 items=0 ppid=2350 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:52.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:52.600896 kubelet[2167]: I1213 14:30:52.600826 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-wkgbh" podStartSLOduration=4.8642045750000005 podStartE2EDuration="12.60072171s" podCreationTimestamp="2024-12-13 14:30:40 +0000 UTC" firstStartedPulling="2024-12-13 14:30:41.072393404 +0000 UTC m=+14.642165074" lastFinishedPulling="2024-12-13 14:30:48.808910539 +0000 UTC m=+22.378682209" observedRunningTime="2024-12-13 14:30:49.833763124 +0000 UTC m=+23.403534835" watchObservedRunningTime="2024-12-13 14:30:52.60072171 +0000 UTC m=+26.170493425" Dec 13 14:30:52.601767 kubelet[2167]: I1213 14:30:52.601313 2167 topology_manager.go:215] "Topology Admit Handler" podUID="f28cffb7-bdba-40e0-82da-382340e478cf" podNamespace="calico-system" podName="calico-typha-5bf7599458-bczw4" Dec 13 14:30:52.610184 systemd[1]: Created slice kubepods-besteffort-podf28cffb7_bdba_40e0_82da_382340e478cf.slice. Dec 13 14:30:52.751905 kubelet[2167]: I1213 14:30:52.751861 2167 topology_manager.go:215] "Topology Admit Handler" podUID="f6db9f42-be49-437a-bc3d-19334cdb7400" podNamespace="calico-system" podName="calico-node-tslrv" Dec 13 14:30:52.760599 systemd[1]: Created slice kubepods-besteffort-podf6db9f42_be49_437a_bc3d_19334cdb7400.slice. Dec 13 14:30:52.767554 kubelet[2167]: I1213 14:30:52.767439 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dzbrx\" (UniqueName: \"kubernetes.io/projected/f28cffb7-bdba-40e0-82da-382340e478cf-kube-api-access-dzbrx\") pod \"calico-typha-5bf7599458-bczw4\" (UID: \"f28cffb7-bdba-40e0-82da-382340e478cf\") " pod="calico-system/calico-typha-5bf7599458-bczw4" Dec 13 14:30:52.767804 kubelet[2167]: I1213 14:30:52.767603 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f28cffb7-bdba-40e0-82da-382340e478cf-tigera-ca-bundle\") pod \"calico-typha-5bf7599458-bczw4\" (UID: \"f28cffb7-bdba-40e0-82da-382340e478cf\") " pod="calico-system/calico-typha-5bf7599458-bczw4" Dec 13 14:30:52.767804 kubelet[2167]: I1213 14:30:52.767704 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f28cffb7-bdba-40e0-82da-382340e478cf-typha-certs\") pod \"calico-typha-5bf7599458-bczw4\" (UID: \"f28cffb7-bdba-40e0-82da-382340e478cf\") " pod="calico-system/calico-typha-5bf7599458-bczw4" Dec 13 14:30:52.869039 kubelet[2167]: I1213 14:30:52.868978 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-log-dir\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869039 kubelet[2167]: I1213 14:30:52.869068 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-xtables-lock\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869394 kubelet[2167]: I1213 14:30:52.869104 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f6db9f42-be49-437a-bc3d-19334cdb7400-node-certs\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869394 kubelet[2167]: I1213 14:30:52.869136 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-var-run-calico\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869394 kubelet[2167]: I1213 14:30:52.869169 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-lib-modules\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869394 kubelet[2167]: I1213 14:30:52.869211 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8xz6x\" (UniqueName: \"kubernetes.io/projected/f6db9f42-be49-437a-bc3d-19334cdb7400-kube-api-access-8xz6x\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869394 kubelet[2167]: I1213 14:30:52.869305 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-var-lib-calico\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869713 kubelet[2167]: I1213 14:30:52.869340 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-bin-dir\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869713 kubelet[2167]: I1213 14:30:52.869384 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-flexvol-driver-host\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869713 kubelet[2167]: I1213 14:30:52.869418 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f6db9f42-be49-437a-bc3d-19334cdb7400-tigera-ca-bundle\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869713 kubelet[2167]: I1213 14:30:52.869458 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-net-dir\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.869713 kubelet[2167]: I1213 14:30:52.869524 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-policysync\") pod \"calico-node-tslrv\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " pod="calico-system/calico-node-tslrv" Dec 13 14:30:52.887562 kubelet[2167]: I1213 14:30:52.887438 2167 topology_manager.go:215] "Topology Admit Handler" podUID="35aa5620-1a3c-4a17-abdd-a4aa40940c29" podNamespace="calico-system" podName="csi-node-driver-t97wl" Dec 13 14:30:52.888103 kubelet[2167]: E1213 14:30:52.888014 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t97wl" podUID="35aa5620-1a3c-4a17-abdd-a4aa40940c29" Dec 13 14:30:52.996805 kubelet[2167]: E1213 14:30:52.996754 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:52.996805 kubelet[2167]: W1213 14:30:52.996794 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:52.997114 kubelet[2167]: E1213 14:30:52.996836 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.012088 kubelet[2167]: E1213 14:30:53.011965 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.012088 kubelet[2167]: W1213 14:30:53.012001 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.012088 kubelet[2167]: E1213 14:30:53.012039 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.068640 env[1234]: time="2024-12-13T14:30:53.068550882Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tslrv,Uid:f6db9f42-be49-437a-bc3d-19334cdb7400,Namespace:calico-system,Attempt:0,}" Dec 13 14:30:53.072566 kubelet[2167]: E1213 14:30:53.072520 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.072566 kubelet[2167]: W1213 14:30:53.072553 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.072874 kubelet[2167]: E1213 14:30:53.072628 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.073571 kubelet[2167]: I1213 14:30:53.072699 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/35aa5620-1a3c-4a17-abdd-a4aa40940c29-socket-dir\") pod \"csi-node-driver-t97wl\" (UID: \"35aa5620-1a3c-4a17-abdd-a4aa40940c29\") " pod="calico-system/csi-node-driver-t97wl" Dec 13 14:30:53.074728 kubelet[2167]: E1213 14:30:53.074695 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.074728 kubelet[2167]: W1213 14:30:53.074725 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.074905 kubelet[2167]: E1213 14:30:53.074763 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.075574 kubelet[2167]: E1213 14:30:53.075544 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.075574 kubelet[2167]: W1213 14:30:53.075571 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.075810 kubelet[2167]: E1213 14:30:53.075781 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.076571 kubelet[2167]: E1213 14:30:53.076544 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.076571 kubelet[2167]: W1213 14:30:53.076569 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.077434 kubelet[2167]: E1213 14:30:53.076594 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.077434 kubelet[2167]: I1213 14:30:53.076668 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/35aa5620-1a3c-4a17-abdd-a4aa40940c29-varrun\") pod \"csi-node-driver-t97wl\" (UID: \"35aa5620-1a3c-4a17-abdd-a4aa40940c29\") " pod="calico-system/csi-node-driver-t97wl" Dec 13 14:30:53.077434 kubelet[2167]: E1213 14:30:53.077003 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.077434 kubelet[2167]: W1213 14:30:53.077019 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.077434 kubelet[2167]: E1213 14:30:53.077046 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.077434 kubelet[2167]: I1213 14:30:53.077081 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/35aa5620-1a3c-4a17-abdd-a4aa40940c29-registration-dir\") pod \"csi-node-driver-t97wl\" (UID: \"35aa5620-1a3c-4a17-abdd-a4aa40940c29\") " pod="calico-system/csi-node-driver-t97wl" Dec 13 14:30:53.079311 kubelet[2167]: E1213 14:30:53.079274 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.079311 kubelet[2167]: W1213 14:30:53.079307 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.079485 kubelet[2167]: E1213 14:30:53.079341 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.079485 kubelet[2167]: I1213 14:30:53.079383 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/35aa5620-1a3c-4a17-abdd-a4aa40940c29-kubelet-dir\") pod \"csi-node-driver-t97wl\" (UID: \"35aa5620-1a3c-4a17-abdd-a4aa40940c29\") " pod="calico-system/csi-node-driver-t97wl" Dec 13 14:30:53.080503 kubelet[2167]: E1213 14:30:53.080472 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.080503 kubelet[2167]: W1213 14:30:53.080498 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.081047 kubelet[2167]: E1213 14:30:53.081017 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.081175 kubelet[2167]: I1213 14:30:53.081076 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-szrc8\" (UniqueName: \"kubernetes.io/projected/35aa5620-1a3c-4a17-abdd-a4aa40940c29-kube-api-access-szrc8\") pod \"csi-node-driver-t97wl\" (UID: \"35aa5620-1a3c-4a17-abdd-a4aa40940c29\") " pod="calico-system/csi-node-driver-t97wl" Dec 13 14:30:53.081721 kubelet[2167]: E1213 14:30:53.081696 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.081721 kubelet[2167]: W1213 14:30:53.081719 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.081935 kubelet[2167]: E1213 14:30:53.081912 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.082253 kubelet[2167]: E1213 14:30:53.082230 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.082253 kubelet[2167]: W1213 14:30:53.082251 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.090802 kubelet[2167]: E1213 14:30:53.084201 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.090802 kubelet[2167]: E1213 14:30:53.084446 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.090802 kubelet[2167]: W1213 14:30:53.084460 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.090802 kubelet[2167]: E1213 14:30:53.084624 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.090802 kubelet[2167]: E1213 14:30:53.084812 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.090802 kubelet[2167]: W1213 14:30:53.084824 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.090802 kubelet[2167]: E1213 14:30:53.084939 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.090802 kubelet[2167]: E1213 14:30:53.085124 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.090802 kubelet[2167]: W1213 14:30:53.085135 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.090802 kubelet[2167]: E1213 14:30:53.085157 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.091428 kubelet[2167]: E1213 14:30:53.086050 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.091428 kubelet[2167]: W1213 14:30:53.086065 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.091428 kubelet[2167]: E1213 14:30:53.086087 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.091428 kubelet[2167]: E1213 14:30:53.086401 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.091428 kubelet[2167]: W1213 14:30:53.086414 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.091428 kubelet[2167]: E1213 14:30:53.086433 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.091428 kubelet[2167]: E1213 14:30:53.086734 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.091428 kubelet[2167]: W1213 14:30:53.086760 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.091428 kubelet[2167]: E1213 14:30:53.086780 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.113839 env[1234]: time="2024-12-13T14:30:53.113736843Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:53.113839 env[1234]: time="2024-12-13T14:30:53.113850826Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:53.114173 env[1234]: time="2024-12-13T14:30:53.113891495Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:53.114246 env[1234]: time="2024-12-13T14:30:53.114180173Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267 pid=2566 runtime=io.containerd.runc.v2 Dec 13 14:30:53.140339 systemd[1]: Started cri-containerd-ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267.scope. Dec 13 14:30:53.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.171000 audit: BPF prog-id=118 op=LOAD Dec 13 14:30:53.174000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.174000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2566 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643762636565643433663533396335633139333737383234643766 Dec 13 14:30:53.175000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.175000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2566 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643762636565643433663533396335633139333737383234643766 Dec 13 14:30:53.176000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.176000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.176000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.176000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.176000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.176000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.176000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.176000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.176000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.176000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.176000 audit: BPF prog-id=119 op=LOAD Dec 13 14:30:53.176000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003abd10 items=0 ppid=2566 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643762636565643433663533396335633139333737383234643766 Dec 13 14:30:53.177000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.177000 audit: BPF prog-id=120 op=LOAD Dec 13 14:30:53.177000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003abd58 items=0 ppid=2566 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643762636565643433663533396335633139333737383234643766 Dec 13 14:30:53.178000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:30:53.178000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:30:53.178000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.178000 audit: BPF prog-id=121 op=LOAD Dec 13 14:30:53.178000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003fc168 items=0 ppid=2566 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643762636565643433663533396335633139333737383234643766 Dec 13 14:30:53.186268 kubelet[2167]: E1213 14:30:53.182548 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.186268 kubelet[2167]: W1213 14:30:53.182576 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.186268 kubelet[2167]: E1213 14:30:53.182626 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.186268 kubelet[2167]: E1213 14:30:53.183150 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.186268 kubelet[2167]: W1213 14:30:53.183169 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.186268 kubelet[2167]: E1213 14:30:53.183203 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.186268 kubelet[2167]: E1213 14:30:53.183637 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.186268 kubelet[2167]: W1213 14:30:53.183654 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.186268 kubelet[2167]: E1213 14:30:53.183682 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.186268 kubelet[2167]: E1213 14:30:53.184139 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.187022 kubelet[2167]: W1213 14:30:53.184154 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.187022 kubelet[2167]: E1213 14:30:53.184184 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.187022 kubelet[2167]: E1213 14:30:53.184743 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.187022 kubelet[2167]: W1213 14:30:53.184760 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.187022 kubelet[2167]: E1213 14:30:53.184909 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.187022 kubelet[2167]: E1213 14:30:53.185211 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.187022 kubelet[2167]: W1213 14:30:53.185236 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.187022 kubelet[2167]: E1213 14:30:53.185392 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.187022 kubelet[2167]: E1213 14:30:53.185674 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.187022 kubelet[2167]: W1213 14:30:53.185689 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.187525 kubelet[2167]: E1213 14:30:53.185857 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.187525 kubelet[2167]: E1213 14:30:53.186113 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.187525 kubelet[2167]: W1213 14:30:53.186141 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.189049 kubelet[2167]: E1213 14:30:53.187752 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.189049 kubelet[2167]: E1213 14:30:53.188055 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.189049 kubelet[2167]: W1213 14:30:53.188071 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.189049 kubelet[2167]: E1213 14:30:53.188214 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.189049 kubelet[2167]: E1213 14:30:53.188496 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.189049 kubelet[2167]: W1213 14:30:53.188520 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.189049 kubelet[2167]: E1213 14:30:53.188687 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.189640 kubelet[2167]: E1213 14:30:53.189509 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.189640 kubelet[2167]: W1213 14:30:53.189527 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.190410 kubelet[2167]: E1213 14:30:53.189848 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.190410 kubelet[2167]: E1213 14:30:53.190113 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.190410 kubelet[2167]: W1213 14:30:53.190127 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.190410 kubelet[2167]: E1213 14:30:53.190259 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.190971 kubelet[2167]: E1213 14:30:53.190847 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.190971 kubelet[2167]: W1213 14:30:53.190864 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.191328 kubelet[2167]: E1213 14:30:53.191170 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.191519 kubelet[2167]: E1213 14:30:53.191503 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.191791 kubelet[2167]: W1213 14:30:53.191767 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.192096 kubelet[2167]: E1213 14:30:53.192076 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.192321 kubelet[2167]: E1213 14:30:53.192293 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.192455 kubelet[2167]: W1213 14:30:53.192436 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.192740 kubelet[2167]: E1213 14:30:53.192720 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.192943 kubelet[2167]: E1213 14:30:53.192930 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.193062 kubelet[2167]: W1213 14:30:53.193045 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.193313 kubelet[2167]: E1213 14:30:53.193284 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.193980 kubelet[2167]: E1213 14:30:53.193961 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.194120 kubelet[2167]: W1213 14:30:53.194102 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.194378 kubelet[2167]: E1213 14:30:53.194359 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.194647 kubelet[2167]: E1213 14:30:53.194588 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.194772 kubelet[2167]: W1213 14:30:53.194754 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.195003 kubelet[2167]: E1213 14:30:53.194987 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.195359 kubelet[2167]: E1213 14:30:53.195343 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.195498 kubelet[2167]: W1213 14:30:53.195480 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.195909 kubelet[2167]: E1213 14:30:53.195888 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.196157 kubelet[2167]: E1213 14:30:53.196140 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.196286 kubelet[2167]: W1213 14:30:53.196267 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.196681 kubelet[2167]: E1213 14:30:53.196654 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.197437 kubelet[2167]: E1213 14:30:53.197416 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.197817 kubelet[2167]: W1213 14:30:53.197792 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.198160 kubelet[2167]: E1213 14:30:53.198136 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.198395 kubelet[2167]: E1213 14:30:53.198378 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.198545 kubelet[2167]: W1213 14:30:53.198512 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.198902 kubelet[2167]: E1213 14:30:53.198879 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.199144 kubelet[2167]: E1213 14:30:53.199125 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.199291 kubelet[2167]: W1213 14:30:53.199269 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.199719 kubelet[2167]: E1213 14:30:53.199593 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.199959 kubelet[2167]: E1213 14:30:53.199940 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.200088 kubelet[2167]: W1213 14:30:53.200069 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.200382 kubelet[2167]: E1213 14:30:53.200358 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.200902 kubelet[2167]: E1213 14:30:53.200554 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.200902 kubelet[2167]: W1213 14:30:53.200573 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.200902 kubelet[2167]: E1213 14:30:53.200600 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.218991 env[1234]: time="2024-12-13T14:30:53.218927215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5bf7599458-bczw4,Uid:f28cffb7-bdba-40e0-82da-382340e478cf,Namespace:calico-system,Attempt:0,}" Dec 13 14:30:53.232837 kubelet[2167]: E1213 14:30:53.232692 2167 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:53.232837 kubelet[2167]: W1213 14:30:53.232724 2167 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:53.232837 kubelet[2167]: E1213 14:30:53.232762 2167 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:53.250993 env[1234]: time="2024-12-13T14:30:53.250333985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tslrv,Uid:f6db9f42-be49-437a-bc3d-19334cdb7400,Namespace:calico-system,Attempt:0,} returns sandbox id \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\"" Dec 13 14:30:53.252936 env[1234]: time="2024-12-13T14:30:53.252884324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:30:53.285679 env[1234]: time="2024-12-13T14:30:53.274238448Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:53.285679 env[1234]: time="2024-12-13T14:30:53.274336686Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:53.285679 env[1234]: time="2024-12-13T14:30:53.284735295Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:53.285679 env[1234]: time="2024-12-13T14:30:53.285178311Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5 pid=2634 runtime=io.containerd.runc.v2 Dec 13 14:30:53.318864 systemd[1]: Started cri-containerd-597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5.scope. Dec 13 14:30:53.557000 audit[2654]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2654 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:53.557000 audit[2654]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffcc0e026b0 a2=0 a3=7ffcc0e0269c items=0 ppid=2350 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.557000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:53.561000 audit[2654]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2654 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:53.561000 audit[2654]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcc0e026b0 a2=0 a3=0 items=0 ppid=2350 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.561000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:53.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.569000 audit: BPF prog-id=122 op=LOAD Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2634 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376632613065626563376137393066343333626536643161396236 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2634 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376632613065626563376137393066343333626536643161396236 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit: BPF prog-id=123 op=LOAD Dec 13 14:30:53.570000 audit[2644]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0520 items=0 ppid=2634 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376632613065626563376137393066343333626536643161396236 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.570000 audit: BPF prog-id=124 op=LOAD Dec 13 14:30:53.570000 audit[2644]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0568 items=0 ppid=2634 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376632613065626563376137393066343333626536643161396236 Dec 13 14:30:53.571000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:30:53.571000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:30:53.571000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:53.571000 audit: BPF prog-id=125 op=LOAD Dec 13 14:30:53.571000 audit[2644]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0978 items=0 ppid=2634 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:53.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376632613065626563376137393066343333626536643161396236 Dec 13 14:30:53.630697 env[1234]: time="2024-12-13T14:30:53.630596691Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5bf7599458-bczw4,Uid:f28cffb7-bdba-40e0-82da-382340e478cf,Namespace:calico-system,Attempt:0,} returns sandbox id \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\"" Dec 13 14:30:54.359163 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2065183057.mount: Deactivated successfully. Dec 13 14:30:54.550323 env[1234]: time="2024-12-13T14:30:54.550265956Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:54.554462 env[1234]: time="2024-12-13T14:30:54.554401460Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:54.557816 env[1234]: time="2024-12-13T14:30:54.557745145Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:54.559878 env[1234]: time="2024-12-13T14:30:54.559809831Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:54.561130 env[1234]: time="2024-12-13T14:30:54.561069148Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:30:54.563851 env[1234]: time="2024-12-13T14:30:54.563779496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:30:54.565458 env[1234]: time="2024-12-13T14:30:54.565394221Z" level=info msg="CreateContainer within sandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:30:54.600521 env[1234]: time="2024-12-13T14:30:54.600432744Z" level=info msg="CreateContainer within sandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\"" Dec 13 14:30:54.601758 env[1234]: time="2024-12-13T14:30:54.601705571Z" level=info msg="StartContainer for \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\"" Dec 13 14:30:54.643351 systemd[1]: Started cri-containerd-c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86.scope. Dec 13 14:30:54.708931 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 14:30:54.709187 kernel: audit: type=1400 audit(1734100254.680:961): avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.680000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.744087 kernel: audit: type=1300 audit(1734100254.680:961): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f2435da7858 items=0 ppid=2566 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.680000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f2435da7858 items=0 ppid=2566 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.744499 kubelet[2167]: E1213 14:30:54.712460 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t97wl" podUID="35aa5620-1a3c-4a17-abdd-a4aa40940c29" Dec 13 14:30:54.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330346438353731663835343934656236363534316533663535383933 Dec 13 14:30:54.777751 kernel: audit: type=1327 audit(1734100254.680:961): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330346438353731663835343934656236363534316533663535383933 Dec 13 14:30:54.681000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.815651 kernel: audit: type=1400 audit(1734100254.681:962): avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.681000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.836797 kernel: audit: type=1400 audit(1734100254.681:962): avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.681000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.859650 kernel: audit: type=1400 audit(1734100254.681:962): avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.681000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.884699 kernel: audit: type=1400 audit(1734100254.681:962): avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.681000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.889350 env[1234]: time="2024-12-13T14:30:54.889255995Z" level=info msg="StartContainer for \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\" returns successfully" Dec 13 14:30:54.899349 systemd[1]: cri-containerd-c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86.scope: Deactivated successfully. Dec 13 14:30:54.681000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.929174 kernel: audit: type=1400 audit(1734100254.681:962): avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.929359 kernel: audit: type=1400 audit(1734100254.681:962): avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.932716 kernel: audit: type=1400 audit(1734100254.681:962): avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.681000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.681000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.681000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.681000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.681000 audit: BPF prog-id=126 op=LOAD Dec 13 14:30:54.681000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002e7c58 items=0 ppid=2566 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330346438353731663835343934656236363534316533663535383933 Dec 13 14:30:54.741000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.741000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.741000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.741000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.741000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.741000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.741000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.741000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.741000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.741000 audit: BPF prog-id=127 op=LOAD Dec 13 14:30:54.741000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002e7ca8 items=0 ppid=2566 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330346438353731663835343934656236363534316533663535383933 Dec 13 14:30:54.742000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:30:54.742000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:30:54.742000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.742000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.742000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.742000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.742000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.742000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.742000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.742000 audit[2676]: AVC avc: denied { perfmon } for pid=2676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.742000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.742000 audit[2676]: AVC avc: denied { bpf } for pid=2676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:54.742000 audit: BPF prog-id=128 op=LOAD Dec 13 14:30:54.742000 audit[2676]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002e7d38 items=0 ppid=2566 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330346438353731663835343934656236363534316533663535383933 Dec 13 14:30:54.950000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:30:54.980789 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86-rootfs.mount: Deactivated successfully. Dec 13 14:30:55.292871 env[1234]: time="2024-12-13T14:30:55.292782044Z" level=info msg="shim disconnected" id=c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86 Dec 13 14:30:55.292871 env[1234]: time="2024-12-13T14:30:55.292865172Z" level=warning msg="cleaning up after shim disconnected" id=c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86 namespace=k8s.io Dec 13 14:30:55.292871 env[1234]: time="2024-12-13T14:30:55.292880644Z" level=info msg="cleaning up dead shim" Dec 13 14:30:55.308907 env[1234]: time="2024-12-13T14:30:55.308844975Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:30:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2715 runtime=io.containerd.runc.v2\n" Dec 13 14:30:56.697742 kubelet[2167]: E1213 14:30:56.697682 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t97wl" podUID="35aa5620-1a3c-4a17-abdd-a4aa40940c29" Dec 13 14:30:57.020978 env[1234]: time="2024-12-13T14:30:57.020913322Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:57.023472 env[1234]: time="2024-12-13T14:30:57.023423328Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:57.025718 env[1234]: time="2024-12-13T14:30:57.025679987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:57.027682 env[1234]: time="2024-12-13T14:30:57.027646447Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:57.028318 env[1234]: time="2024-12-13T14:30:57.028265122Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:30:57.032780 env[1234]: time="2024-12-13T14:30:57.032667852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:30:57.055965 env[1234]: time="2024-12-13T14:30:57.055907733Z" level=info msg="CreateContainer within sandbox \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:30:57.079390 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount803939179.mount: Deactivated successfully. Dec 13 14:30:57.092715 env[1234]: time="2024-12-13T14:30:57.092648494Z" level=info msg="CreateContainer within sandbox \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\"" Dec 13 14:30:57.094929 env[1234]: time="2024-12-13T14:30:57.094871922Z" level=info msg="StartContainer for \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\"" Dec 13 14:30:57.130422 systemd[1]: Started cri-containerd-1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3.scope. Dec 13 14:30:57.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.175000 audit: BPF prog-id=129 op=LOAD Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2634 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:57.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313133353161376130306337326231303332333335316363326335 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2634 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:57.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313133353161376130306337326231303332333335316363326335 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit: BPF prog-id=130 op=LOAD Dec 13 14:30:57.176000 audit[2741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025eb0 items=0 ppid=2634 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:57.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313133353161376130306337326231303332333335316363326335 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit: BPF prog-id=131 op=LOAD Dec 13 14:30:57.176000 audit[2741]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025ef8 items=0 ppid=2634 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:57.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313133353161376130306337326231303332333335316363326335 Dec 13 14:30:57.176000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:30:57.176000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:57.176000 audit: BPF prog-id=132 op=LOAD Dec 13 14:30:57.176000 audit[2741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002ee308 items=0 ppid=2634 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:57.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313133353161376130306337326231303332333335316363326335 Dec 13 14:30:57.228907 env[1234]: time="2024-12-13T14:30:57.228837993Z" level=info msg="StartContainer for \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\" returns successfully" Dec 13 14:30:58.693772 kubelet[2167]: E1213 14:30:58.693674 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t97wl" podUID="35aa5620-1a3c-4a17-abdd-a4aa40940c29" Dec 13 14:30:58.910989 kubelet[2167]: I1213 14:30:58.910942 2167 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:31:00.695082 kubelet[2167]: E1213 14:31:00.695022 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t97wl" podUID="35aa5620-1a3c-4a17-abdd-a4aa40940c29" Dec 13 14:31:01.726234 env[1234]: time="2024-12-13T14:31:01.725860371Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:01.729336 env[1234]: time="2024-12-13T14:31:01.729277170Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:01.732140 env[1234]: time="2024-12-13T14:31:01.732096801Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:01.734583 env[1234]: time="2024-12-13T14:31:01.734539278Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:01.735342 env[1234]: time="2024-12-13T14:31:01.735293501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:31:01.738377 env[1234]: time="2024-12-13T14:31:01.738336396Z" level=info msg="CreateContainer within sandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:31:01.756589 env[1234]: time="2024-12-13T14:31:01.756506625Z" level=info msg="CreateContainer within sandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\"" Dec 13 14:31:01.762908 env[1234]: time="2024-12-13T14:31:01.760949186Z" level=info msg="StartContainer for \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\"" Dec 13 14:31:01.810977 systemd[1]: run-containerd-runc-k8s.io-63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e-runc.yOkcRv.mount: Deactivated successfully. Dec 13 14:31:01.817990 systemd[1]: Started cri-containerd-63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e.scope. Dec 13 14:31:01.859229 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 14:31:01.859535 kernel: audit: type=1400 audit(1734100261.849:986): avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7b147daf78 items=0 ppid=2566 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:01.909917 kernel: audit: type=1300 audit(1734100261.849:986): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7b147daf78 items=0 ppid=2566 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:01.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633383938643939363233306338323238643836336130646561303235 Dec 13 14:31:01.938872 kernel: audit: type=1327 audit(1734100261.849:986): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633383938643939363233306338323238643836336130646561303235 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.962734 kernel: audit: type=1400 audit(1734100261.849:987): avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.967796 kernel: audit: type=1400 audit(1734100261.849:987): avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.968396 env[1234]: time="2024-12-13T14:31:01.968308844Z" level=info msg="StartContainer for \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\" returns successfully" Dec 13 14:31:02.004262 kernel: audit: type=1400 audit(1734100261.849:987): avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:02.027704 kernel: audit: type=1400 audit(1734100261.849:987): avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:02.070220 kernel: audit: type=1400 audit(1734100261.849:987): avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:02.070434 kernel: audit: type=1400 audit(1734100261.849:987): avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:02.092638 kernel: audit: type=1400 audit(1734100261.849:987): avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit: BPF prog-id=133 op=LOAD Dec 13 14:31:01.849000 audit[2779]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027a178 items=0 ppid=2566 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:01.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633383938643939363233306338323238643836336130646561303235 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit: BPF prog-id=134 op=LOAD Dec 13 14:31:01.849000 audit[2779]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027a1c8 items=0 ppid=2566 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:01.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633383938643939363233306338323238643836336130646561303235 Dec 13 14:31:01.849000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:31:01.849000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:01.849000 audit: BPF prog-id=135 op=LOAD Dec 13 14:31:01.849000 audit[2779]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027a258 items=0 ppid=2566 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:01.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633383938643939363233306338323238643836336130646561303235 Dec 13 14:31:02.692802 kubelet[2167]: E1213 14:31:02.692758 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t97wl" podUID="35aa5620-1a3c-4a17-abdd-a4aa40940c29" Dec 13 14:31:02.951895 kubelet[2167]: I1213 14:31:02.951702 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5bf7599458-bczw4" podStartSLOduration=7.557942314 podStartE2EDuration="10.951595244s" podCreationTimestamp="2024-12-13 14:30:52 +0000 UTC" firstStartedPulling="2024-12-13 14:30:53.635475683 +0000 UTC m=+27.205247346" lastFinishedPulling="2024-12-13 14:30:57.029128605 +0000 UTC m=+30.598900276" observedRunningTime="2024-12-13 14:30:57.931689106 +0000 UTC m=+31.501460787" watchObservedRunningTime="2024-12-13 14:31:02.951595244 +0000 UTC m=+36.521366927" Dec 13 14:31:02.959057 env[1234]: time="2024-12-13T14:31:02.958954448Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:31:02.962918 systemd[1]: cri-containerd-63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e.scope: Deactivated successfully. Dec 13 14:31:02.968000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:31:03.003754 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e-rootfs.mount: Deactivated successfully. Dec 13 14:31:03.027408 kubelet[2167]: I1213 14:31:03.026173 2167 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:31:03.064544 kubelet[2167]: I1213 14:31:03.064482 2167 topology_manager.go:215] "Topology Admit Handler" podUID="5b3ee2f8-79bd-4584-9719-a29cb054948a" podNamespace="kube-system" podName="coredns-76f75df574-hxcn9" Dec 13 14:31:03.075847 kubelet[2167]: I1213 14:31:03.074529 2167 topology_manager.go:215] "Topology Admit Handler" podUID="e154311b-8fc8-44ae-aa00-4736e84ddf09" podNamespace="kube-system" podName="coredns-76f75df574-cgdxk" Dec 13 14:31:03.075847 kubelet[2167]: W1213 14:31:03.075470 2167 reflector.go:539] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' and this object Dec 13 14:31:03.075847 kubelet[2167]: E1213 14:31:03.075511 2167 reflector.go:147] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' and this object Dec 13 14:31:03.075570 systemd[1]: Created slice kubepods-burstable-pod5b3ee2f8_79bd_4584_9719_a29cb054948a.slice. Dec 13 14:31:03.083644 kubelet[2167]: I1213 14:31:03.078227 2167 topology_manager.go:215] "Topology Admit Handler" podUID="cc892c04-22e0-43e8-b63e-0f5712e255b9" podNamespace="calico-system" podName="calico-kube-controllers-84f5cc5c9f-jcfkf" Dec 13 14:31:03.083644 kubelet[2167]: I1213 14:31:03.078457 2167 topology_manager.go:215] "Topology Admit Handler" podUID="badd370c-9501-48de-8db9-744ac371269d" podNamespace="calico-apiserver" podName="calico-apiserver-77bc4bc975-dpr7m" Dec 13 14:31:03.083644 kubelet[2167]: I1213 14:31:03.078635 2167 topology_manager.go:215] "Topology Admit Handler" podUID="bf75ed33-f48d-4643-8a66-df9454f2bfa3" podNamespace="calico-apiserver" podName="calico-apiserver-77bc4bc975-nn98q" Dec 13 14:31:03.097269 systemd[1]: Created slice kubepods-burstable-pode154311b_8fc8_44ae_aa00_4736e84ddf09.slice. Dec 13 14:31:03.110530 systemd[1]: Created slice kubepods-besteffort-podbf75ed33_f48d_4643_8a66_df9454f2bfa3.slice. Dec 13 14:31:03.128040 systemd[1]: Created slice kubepods-besteffort-podcc892c04_22e0_43e8_b63e_0f5712e255b9.slice. Dec 13 14:31:03.139739 systemd[1]: Created slice kubepods-besteffort-podbadd370c_9501_48de_8db9_744ac371269d.slice. Dec 13 14:31:03.201090 kubelet[2167]: I1213 14:31:03.196935 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9njpd\" (UniqueName: \"kubernetes.io/projected/cc892c04-22e0-43e8-b63e-0f5712e255b9-kube-api-access-9njpd\") pod \"calico-kube-controllers-84f5cc5c9f-jcfkf\" (UID: \"cc892c04-22e0-43e8-b63e-0f5712e255b9\") " pod="calico-system/calico-kube-controllers-84f5cc5c9f-jcfkf" Dec 13 14:31:03.201090 kubelet[2167]: I1213 14:31:03.197021 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cc892c04-22e0-43e8-b63e-0f5712e255b9-tigera-ca-bundle\") pod \"calico-kube-controllers-84f5cc5c9f-jcfkf\" (UID: \"cc892c04-22e0-43e8-b63e-0f5712e255b9\") " pod="calico-system/calico-kube-controllers-84f5cc5c9f-jcfkf" Dec 13 14:31:03.201090 kubelet[2167]: I1213 14:31:03.197063 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q78c4\" (UniqueName: \"kubernetes.io/projected/5b3ee2f8-79bd-4584-9719-a29cb054948a-kube-api-access-q78c4\") pod \"coredns-76f75df574-hxcn9\" (UID: \"5b3ee2f8-79bd-4584-9719-a29cb054948a\") " pod="kube-system/coredns-76f75df574-hxcn9" Dec 13 14:31:03.201090 kubelet[2167]: I1213 14:31:03.197108 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jqfjg\" (UniqueName: \"kubernetes.io/projected/e154311b-8fc8-44ae-aa00-4736e84ddf09-kube-api-access-jqfjg\") pod \"coredns-76f75df574-cgdxk\" (UID: \"e154311b-8fc8-44ae-aa00-4736e84ddf09\") " pod="kube-system/coredns-76f75df574-cgdxk" Dec 13 14:31:03.201090 kubelet[2167]: I1213 14:31:03.197146 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/badd370c-9501-48de-8db9-744ac371269d-calico-apiserver-certs\") pod \"calico-apiserver-77bc4bc975-dpr7m\" (UID: \"badd370c-9501-48de-8db9-744ac371269d\") " pod="calico-apiserver/calico-apiserver-77bc4bc975-dpr7m" Dec 13 14:31:03.206074 kubelet[2167]: I1213 14:31:03.197187 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bf75ed33-f48d-4643-8a66-df9454f2bfa3-calico-apiserver-certs\") pod \"calico-apiserver-77bc4bc975-nn98q\" (UID: \"bf75ed33-f48d-4643-8a66-df9454f2bfa3\") " pod="calico-apiserver/calico-apiserver-77bc4bc975-nn98q" Dec 13 14:31:03.206074 kubelet[2167]: I1213 14:31:03.197220 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sdg9k\" (UniqueName: \"kubernetes.io/projected/bf75ed33-f48d-4643-8a66-df9454f2bfa3-kube-api-access-sdg9k\") pod \"calico-apiserver-77bc4bc975-nn98q\" (UID: \"bf75ed33-f48d-4643-8a66-df9454f2bfa3\") " pod="calico-apiserver/calico-apiserver-77bc4bc975-nn98q" Dec 13 14:31:03.206074 kubelet[2167]: I1213 14:31:03.197264 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5b3ee2f8-79bd-4584-9719-a29cb054948a-config-volume\") pod \"coredns-76f75df574-hxcn9\" (UID: \"5b3ee2f8-79bd-4584-9719-a29cb054948a\") " pod="kube-system/coredns-76f75df574-hxcn9" Dec 13 14:31:03.206074 kubelet[2167]: I1213 14:31:03.197309 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-89z42\" (UniqueName: \"kubernetes.io/projected/badd370c-9501-48de-8db9-744ac371269d-kube-api-access-89z42\") pod \"calico-apiserver-77bc4bc975-dpr7m\" (UID: \"badd370c-9501-48de-8db9-744ac371269d\") " pod="calico-apiserver/calico-apiserver-77bc4bc975-dpr7m" Dec 13 14:31:03.206074 kubelet[2167]: I1213 14:31:03.197349 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e154311b-8fc8-44ae-aa00-4736e84ddf09-config-volume\") pod \"coredns-76f75df574-cgdxk\" (UID: \"e154311b-8fc8-44ae-aa00-4736e84ddf09\") " pod="kube-system/coredns-76f75df574-cgdxk" Dec 13 14:31:03.423966 env[1234]: time="2024-12-13T14:31:03.423843251Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77bc4bc975-nn98q,Uid:bf75ed33-f48d-4643-8a66-df9454f2bfa3,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:31:03.503578 env[1234]: time="2024-12-13T14:31:03.503123633Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-84f5cc5c9f-jcfkf,Uid:cc892c04-22e0-43e8-b63e-0f5712e255b9,Namespace:calico-system,Attempt:0,}" Dec 13 14:31:03.503815 env[1234]: time="2024-12-13T14:31:03.503678414Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77bc4bc975-dpr7m,Uid:badd370c-9501-48de-8db9-744ac371269d,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:31:04.054788 env[1234]: time="2024-12-13T14:31:04.054718775Z" level=info msg="shim disconnected" id=63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e Dec 13 14:31:04.055600 env[1234]: time="2024-12-13T14:31:04.055559809Z" level=warning msg="cleaning up after shim disconnected" id=63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e namespace=k8s.io Dec 13 14:31:04.056237 env[1234]: time="2024-12-13T14:31:04.055722831Z" level=info msg="cleaning up dead shim" Dec 13 14:31:04.071635 env[1234]: time="2024-12-13T14:31:04.071564898Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2828 runtime=io.containerd.runc.v2\n" Dec 13 14:31:04.213437 env[1234]: time="2024-12-13T14:31:04.213332157Z" level=error msg="Failed to destroy network for sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.213899 env[1234]: time="2024-12-13T14:31:04.213846835Z" level=error msg="encountered an error cleaning up failed sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.214030 env[1234]: time="2024-12-13T14:31:04.213939881Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77bc4bc975-nn98q,Uid:bf75ed33-f48d-4643-8a66-df9454f2bfa3,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.214743 kubelet[2167]: E1213 14:31:04.214334 2167 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.214743 kubelet[2167]: E1213 14:31:04.214429 2167 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77bc4bc975-nn98q" Dec 13 14:31:04.214743 kubelet[2167]: E1213 14:31:04.214467 2167 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77bc4bc975-nn98q" Dec 13 14:31:04.217779 kubelet[2167]: E1213 14:31:04.214556 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-77bc4bc975-nn98q_calico-apiserver(bf75ed33-f48d-4643-8a66-df9454f2bfa3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-77bc4bc975-nn98q_calico-apiserver(bf75ed33-f48d-4643-8a66-df9454f2bfa3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77bc4bc975-nn98q" podUID="bf75ed33-f48d-4643-8a66-df9454f2bfa3" Dec 13 14:31:04.256571 env[1234]: time="2024-12-13T14:31:04.256492475Z" level=error msg="Failed to destroy network for sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.257483 env[1234]: time="2024-12-13T14:31:04.257419988Z" level=error msg="encountered an error cleaning up failed sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.257819 env[1234]: time="2024-12-13T14:31:04.257760125Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-84f5cc5c9f-jcfkf,Uid:cc892c04-22e0-43e8-b63e-0f5712e255b9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.258557 kubelet[2167]: E1213 14:31:04.258499 2167 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.258726 kubelet[2167]: E1213 14:31:04.258592 2167 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-84f5cc5c9f-jcfkf" Dec 13 14:31:04.258726 kubelet[2167]: E1213 14:31:04.258650 2167 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-84f5cc5c9f-jcfkf" Dec 13 14:31:04.258855 kubelet[2167]: E1213 14:31:04.258764 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-84f5cc5c9f-jcfkf_calico-system(cc892c04-22e0-43e8-b63e-0f5712e255b9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-84f5cc5c9f-jcfkf_calico-system(cc892c04-22e0-43e8-b63e-0f5712e255b9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-84f5cc5c9f-jcfkf" podUID="cc892c04-22e0-43e8-b63e-0f5712e255b9" Dec 13 14:31:04.260933 env[1234]: time="2024-12-13T14:31:04.260849487Z" level=error msg="Failed to destroy network for sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.261483 env[1234]: time="2024-12-13T14:31:04.261418101Z" level=error msg="encountered an error cleaning up failed sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.261595 env[1234]: time="2024-12-13T14:31:04.261494788Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77bc4bc975-dpr7m,Uid:badd370c-9501-48de-8db9-744ac371269d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.261811 kubelet[2167]: E1213 14:31:04.261777 2167 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.261982 kubelet[2167]: E1213 14:31:04.261852 2167 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77bc4bc975-dpr7m" Dec 13 14:31:04.261982 kubelet[2167]: E1213 14:31:04.261891 2167 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-77bc4bc975-dpr7m" Dec 13 14:31:04.261982 kubelet[2167]: E1213 14:31:04.261981 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-77bc4bc975-dpr7m_calico-apiserver(badd370c-9501-48de-8db9-744ac371269d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-77bc4bc975-dpr7m_calico-apiserver(badd370c-9501-48de-8db9-744ac371269d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77bc4bc975-dpr7m" podUID="badd370c-9501-48de-8db9-744ac371269d" Dec 13 14:31:04.300984 kubelet[2167]: E1213 14:31:04.300912 2167 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:31:04.301199 kubelet[2167]: E1213 14:31:04.301071 2167 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/e154311b-8fc8-44ae-aa00-4736e84ddf09-config-volume podName:e154311b-8fc8-44ae-aa00-4736e84ddf09 nodeName:}" failed. No retries permitted until 2024-12-13 14:31:04.80104166 +0000 UTC m=+38.370813333 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/e154311b-8fc8-44ae-aa00-4736e84ddf09-config-volume") pod "coredns-76f75df574-cgdxk" (UID: "e154311b-8fc8-44ae-aa00-4736e84ddf09") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:31:04.301706 kubelet[2167]: E1213 14:31:04.300938 2167 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:31:04.301706 kubelet[2167]: E1213 14:31:04.301468 2167 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/5b3ee2f8-79bd-4584-9719-a29cb054948a-config-volume podName:5b3ee2f8-79bd-4584-9719-a29cb054948a nodeName:}" failed. No retries permitted until 2024-12-13 14:31:04.801378708 +0000 UTC m=+38.371150386 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/5b3ee2f8-79bd-4584-9719-a29cb054948a-config-volume") pod "coredns-76f75df574-hxcn9" (UID: "5b3ee2f8-79bd-4584-9719-a29cb054948a") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:31:04.703363 systemd[1]: Created slice kubepods-besteffort-pod35aa5620_1a3c_4a17_abdd_a4aa40940c29.slice. Dec 13 14:31:04.707055 env[1234]: time="2024-12-13T14:31:04.707002050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t97wl,Uid:35aa5620-1a3c-4a17-abdd-a4aa40940c29,Namespace:calico-system,Attempt:0,}" Dec 13 14:31:04.792049 env[1234]: time="2024-12-13T14:31:04.791941015Z" level=error msg="Failed to destroy network for sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.792592 env[1234]: time="2024-12-13T14:31:04.792525790Z" level=error msg="encountered an error cleaning up failed sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.792777 env[1234]: time="2024-12-13T14:31:04.792674599Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t97wl,Uid:35aa5620-1a3c-4a17-abdd-a4aa40940c29,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.793138 kubelet[2167]: E1213 14:31:04.793103 2167 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:04.793286 kubelet[2167]: E1213 14:31:04.793195 2167 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t97wl" Dec 13 14:31:04.793286 kubelet[2167]: E1213 14:31:04.793251 2167 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t97wl" Dec 13 14:31:04.793516 kubelet[2167]: E1213 14:31:04.793348 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-t97wl_calico-system(35aa5620-1a3c-4a17-abdd-a4aa40940c29)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-t97wl_calico-system(35aa5620-1a3c-4a17-abdd-a4aa40940c29)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t97wl" podUID="35aa5620-1a3c-4a17-abdd-a4aa40940c29" Dec 13 14:31:04.891123 env[1234]: time="2024-12-13T14:31:04.891051829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-hxcn9,Uid:5b3ee2f8-79bd-4584-9719-a29cb054948a,Namespace:kube-system,Attempt:0,}" Dec 13 14:31:04.924356 env[1234]: time="2024-12-13T14:31:04.924282359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cgdxk,Uid:e154311b-8fc8-44ae-aa00-4736e84ddf09,Namespace:kube-system,Attempt:0,}" Dec 13 14:31:04.935837 kubelet[2167]: I1213 14:31:04.935774 2167 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:04.940032 env[1234]: time="2024-12-13T14:31:04.939962451Z" level=info msg="StopPodSandbox for \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\"" Dec 13 14:31:04.968732 kubelet[2167]: I1213 14:31:04.967691 2167 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:04.972387 env[1234]: time="2024-12-13T14:31:04.972299220Z" level=info msg="StopPodSandbox for \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\"" Dec 13 14:31:04.979067 kubelet[2167]: I1213 14:31:04.977756 2167 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:04.979741 env[1234]: time="2024-12-13T14:31:04.979684416Z" level=info msg="StopPodSandbox for \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\"" Dec 13 14:31:04.990931 env[1234]: time="2024-12-13T14:31:04.990855463Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:31:05.006904 kubelet[2167]: I1213 14:31:04.998592 2167 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:05.011212 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2-shm.mount: Deactivated successfully. Dec 13 14:31:05.011394 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670-shm.mount: Deactivated successfully. Dec 13 14:31:05.011512 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392-shm.mount: Deactivated successfully. Dec 13 14:31:05.013403 env[1234]: time="2024-12-13T14:31:05.007678091Z" level=info msg="StopPodSandbox for \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\"" Dec 13 14:31:05.204726 env[1234]: time="2024-12-13T14:31:05.204625046Z" level=error msg="StopPodSandbox for \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\" failed" error="failed to destroy network for sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.205385 kubelet[2167]: E1213 14:31:05.205141 2167 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:05.205385 kubelet[2167]: E1213 14:31:05.205273 2167 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392"} Dec 13 14:31:05.205385 kubelet[2167]: E1213 14:31:05.205348 2167 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cc892c04-22e0-43e8-b63e-0f5712e255b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:05.205699 kubelet[2167]: E1213 14:31:05.205410 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cc892c04-22e0-43e8-b63e-0f5712e255b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-84f5cc5c9f-jcfkf" podUID="cc892c04-22e0-43e8-b63e-0f5712e255b9" Dec 13 14:31:05.212041 env[1234]: time="2024-12-13T14:31:05.211959619Z" level=error msg="StopPodSandbox for \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\" failed" error="failed to destroy network for sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.213026 kubelet[2167]: E1213 14:31:05.212699 2167 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:05.213026 kubelet[2167]: E1213 14:31:05.212814 2167 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2"} Dec 13 14:31:05.213026 kubelet[2167]: E1213 14:31:05.212912 2167 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"badd370c-9501-48de-8db9-744ac371269d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:05.213026 kubelet[2167]: E1213 14:31:05.212987 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"badd370c-9501-48de-8db9-744ac371269d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77bc4bc975-dpr7m" podUID="badd370c-9501-48de-8db9-744ac371269d" Dec 13 14:31:05.237082 env[1234]: time="2024-12-13T14:31:05.236483231Z" level=error msg="Failed to destroy network for sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.241673 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952-shm.mount: Deactivated successfully. Dec 13 14:31:05.245218 env[1234]: time="2024-12-13T14:31:05.245138434Z" level=error msg="encountered an error cleaning up failed sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.245516 env[1234]: time="2024-12-13T14:31:05.245461310Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-hxcn9,Uid:5b3ee2f8-79bd-4584-9719-a29cb054948a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.248217 kubelet[2167]: E1213 14:31:05.247758 2167 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.248217 kubelet[2167]: E1213 14:31:05.247903 2167 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-hxcn9" Dec 13 14:31:05.248217 kubelet[2167]: E1213 14:31:05.247994 2167 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-hxcn9" Dec 13 14:31:05.249160 kubelet[2167]: E1213 14:31:05.248157 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-hxcn9_kube-system(5b3ee2f8-79bd-4584-9719-a29cb054948a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-hxcn9_kube-system(5b3ee2f8-79bd-4584-9719-a29cb054948a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-hxcn9" podUID="5b3ee2f8-79bd-4584-9719-a29cb054948a" Dec 13 14:31:05.267710 env[1234]: time="2024-12-13T14:31:05.267618739Z" level=error msg="StopPodSandbox for \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\" failed" error="failed to destroy network for sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.268594 kubelet[2167]: E1213 14:31:05.268438 2167 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:05.268594 kubelet[2167]: E1213 14:31:05.268520 2167 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef"} Dec 13 14:31:05.268594 kubelet[2167]: E1213 14:31:05.268588 2167 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"35aa5620-1a3c-4a17-abdd-a4aa40940c29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:05.268994 kubelet[2167]: E1213 14:31:05.268664 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"35aa5620-1a3c-4a17-abdd-a4aa40940c29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t97wl" podUID="35aa5620-1a3c-4a17-abdd-a4aa40940c29" Dec 13 14:31:05.269503 env[1234]: time="2024-12-13T14:31:05.269430358Z" level=error msg="StopPodSandbox for \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\" failed" error="failed to destroy network for sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.270117 kubelet[2167]: E1213 14:31:05.270034 2167 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:05.270117 kubelet[2167]: E1213 14:31:05.270117 2167 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670"} Dec 13 14:31:05.270316 kubelet[2167]: E1213 14:31:05.270196 2167 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bf75ed33-f48d-4643-8a66-df9454f2bfa3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:05.270316 kubelet[2167]: E1213 14:31:05.270247 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bf75ed33-f48d-4643-8a66-df9454f2bfa3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-77bc4bc975-nn98q" podUID="bf75ed33-f48d-4643-8a66-df9454f2bfa3" Dec 13 14:31:05.288552 env[1234]: time="2024-12-13T14:31:05.288471491Z" level=error msg="Failed to destroy network for sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.289395 env[1234]: time="2024-12-13T14:31:05.289330102Z" level=error msg="encountered an error cleaning up failed sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.289703 env[1234]: time="2024-12-13T14:31:05.289655767Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cgdxk,Uid:e154311b-8fc8-44ae-aa00-4736e84ddf09,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.292987 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286-shm.mount: Deactivated successfully. Dec 13 14:31:05.295067 kubelet[2167]: E1213 14:31:05.294594 2167 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:05.295067 kubelet[2167]: E1213 14:31:05.294735 2167 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-cgdxk" Dec 13 14:31:05.295067 kubelet[2167]: E1213 14:31:05.294774 2167 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-cgdxk" Dec 13 14:31:05.295955 kubelet[2167]: E1213 14:31:05.295916 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-cgdxk_kube-system(e154311b-8fc8-44ae-aa00-4736e84ddf09)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-cgdxk_kube-system(e154311b-8fc8-44ae-aa00-4736e84ddf09)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-cgdxk" podUID="e154311b-8fc8-44ae-aa00-4736e84ddf09" Dec 13 14:31:06.002701 kubelet[2167]: I1213 14:31:06.002644 2167 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:06.003786 env[1234]: time="2024-12-13T14:31:06.003725357Z" level=info msg="StopPodSandbox for \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\"" Dec 13 14:31:06.004905 kubelet[2167]: I1213 14:31:06.004872 2167 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:06.005543 env[1234]: time="2024-12-13T14:31:06.005488421Z" level=info msg="StopPodSandbox for \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\"" Dec 13 14:31:06.092054 env[1234]: time="2024-12-13T14:31:06.091958619Z" level=error msg="StopPodSandbox for \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\" failed" error="failed to destroy network for sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:06.093330 kubelet[2167]: E1213 14:31:06.093051 2167 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:06.093330 kubelet[2167]: E1213 14:31:06.093129 2167 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952"} Dec 13 14:31:06.093330 kubelet[2167]: E1213 14:31:06.093192 2167 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5b3ee2f8-79bd-4584-9719-a29cb054948a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:06.093330 kubelet[2167]: E1213 14:31:06.093252 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5b3ee2f8-79bd-4584-9719-a29cb054948a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-hxcn9" podUID="5b3ee2f8-79bd-4584-9719-a29cb054948a" Dec 13 14:31:06.101788 env[1234]: time="2024-12-13T14:31:06.101691118Z" level=error msg="StopPodSandbox for \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\" failed" error="failed to destroy network for sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:06.102476 kubelet[2167]: E1213 14:31:06.102227 2167 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:06.102476 kubelet[2167]: E1213 14:31:06.102298 2167 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286"} Dec 13 14:31:06.102476 kubelet[2167]: E1213 14:31:06.102366 2167 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e154311b-8fc8-44ae-aa00-4736e84ddf09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:06.102476 kubelet[2167]: E1213 14:31:06.102426 2167 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e154311b-8fc8-44ae-aa00-4736e84ddf09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-cgdxk" podUID="e154311b-8fc8-44ae-aa00-4736e84ddf09" Dec 13 14:31:12.656867 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4290695488.mount: Deactivated successfully. Dec 13 14:31:12.693791 env[1234]: time="2024-12-13T14:31:12.693718574Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:12.696937 env[1234]: time="2024-12-13T14:31:12.696876993Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:12.700688 env[1234]: time="2024-12-13T14:31:12.700645311Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:12.702768 env[1234]: time="2024-12-13T14:31:12.702723308Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:12.703169 env[1234]: time="2024-12-13T14:31:12.703119717Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:31:12.737110 env[1234]: time="2024-12-13T14:31:12.737037789Z" level=info msg="CreateContainer within sandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:31:12.763426 env[1234]: time="2024-12-13T14:31:12.763373371Z" level=info msg="CreateContainer within sandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\"" Dec 13 14:31:12.766234 env[1234]: time="2024-12-13T14:31:12.764878467Z" level=info msg="StartContainer for \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\"" Dec 13 14:31:12.811700 systemd[1]: Started cri-containerd-49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6.scope. Dec 13 14:31:12.874856 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:31:12.875108 kernel: audit: type=1400 audit(1734100272.846:993): avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f3e085ee5d8 items=0 ppid=2566 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:12.909792 kernel: audit: type=1300 audit(1734100272.846:993): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f3e085ee5d8 items=0 ppid=2566 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:12.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623633383430343635353663303866303230366665323164303765 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.961819 kernel: audit: type=1327 audit(1734100272.846:993): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623633383430343635353663303866303230366665323164303765 Dec 13 14:31:12.962037 kernel: audit: type=1400 audit(1734100272.846:994): avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.982574 kernel: audit: type=1400 audit(1734100272.846:994): avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.984154 kernel: audit: type=1400 audit(1734100272.846:994): avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:13.013105 env[1234]: time="2024-12-13T14:31:13.013016332Z" level=info msg="StartContainer for \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\" returns successfully" Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:13.045721 kernel: audit: type=1400 audit(1734100272.846:994): avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:13.045948 kernel: audit: type=1400 audit(1734100272.846:994): avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:13.049226 kernel: audit: type=1400 audit(1734100272.846:994): avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:13.093954 kernel: audit: type=1400 audit(1734100272.846:994): avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit: BPF prog-id=136 op=LOAD Dec 13 14:31:12.846000 audit[3166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0003e26a8 items=0 ppid=2566 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:12.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623633383430343635353663303866303230366665323164303765 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.846000 audit: BPF prog-id=137 op=LOAD Dec 13 14:31:12.846000 audit[3166]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0003e26f8 items=0 ppid=2566 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:12.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623633383430343635353663303866303230366665323164303765 Dec 13 14:31:12.847000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:31:12.847000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:31:12.847000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.847000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.847000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.847000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.847000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.847000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.847000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.847000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.847000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.847000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:12.847000 audit: BPF prog-id=138 op=LOAD Dec 13 14:31:12.847000 audit[3166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0003e2788 items=0 ppid=2566 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:12.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623633383430343635353663303866303230366665323164303765 Dec 13 14:31:13.114743 kubelet[2167]: I1213 14:31:13.114698 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-tslrv" podStartSLOduration=1.662676907 podStartE2EDuration="21.114604073s" podCreationTimestamp="2024-12-13 14:30:52 +0000 UTC" firstStartedPulling="2024-12-13 14:30:53.252250471 +0000 UTC m=+26.822022134" lastFinishedPulling="2024-12-13 14:31:12.704177629 +0000 UTC m=+46.273949300" observedRunningTime="2024-12-13 14:31:13.111481915 +0000 UTC m=+46.681253606" watchObservedRunningTime="2024-12-13 14:31:13.114604073 +0000 UTC m=+46.684375751" Dec 13 14:31:13.171636 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:31:13.171876 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:31:14.600000 audit[3289]: AVC avc: denied { write } for pid=3289 comm="tee" name="fd" dev="proc" ino=24167 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:14.600000 audit[3289]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdbd57d9c5 a2=241 a3=1b6 items=1 ppid=3235 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:14.600000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:31:14.600000 audit: PATH item=0 name="/dev/fd/63" inode=25031 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:14.600000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:14.603000 audit[3274]: AVC avc: denied { write } for pid=3274 comm="tee" name="fd" dev="proc" ino=24171 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:14.604000 audit[3268]: AVC avc: denied { write } for pid=3268 comm="tee" name="fd" dev="proc" ino=24174 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:14.604000 audit[3268]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde8fe89c4 a2=241 a3=1b6 items=1 ppid=3241 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:14.604000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:31:14.604000 audit: PATH item=0 name="/dev/fd/63" inode=24155 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:14.604000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:14.603000 audit[3274]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea21aa9c4 a2=241 a3=1b6 items=1 ppid=3233 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:14.603000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:31:14.603000 audit: PATH item=0 name="/dev/fd/63" inode=25028 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:14.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:14.618000 audit[3286]: AVC avc: denied { write } for pid=3286 comm="tee" name="fd" dev="proc" ino=25040 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:14.633000 audit[3292]: AVC avc: denied { write } for pid=3292 comm="tee" name="fd" dev="proc" ino=24181 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:14.633000 audit[3292]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb19429c4 a2=241 a3=1b6 items=1 ppid=3229 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:14.633000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:31:14.633000 audit: PATH item=0 name="/dev/fd/63" inode=25032 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:14.633000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:14.618000 audit[3286]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffda48f9b4 a2=241 a3=1b6 items=1 ppid=3242 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:14.618000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:31:14.618000 audit: PATH item=0 name="/dev/fd/63" inode=24162 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:14.618000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:14.670000 audit[3297]: AVC avc: denied { write } for pid=3297 comm="tee" name="fd" dev="proc" ino=24185 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:14.670000 audit[3297]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe646569c6 a2=241 a3=1b6 items=1 ppid=3239 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:14.670000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:31:14.670000 audit: PATH item=0 name="/dev/fd/63" inode=25035 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:14.670000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:14.676000 audit[3307]: AVC avc: denied { write } for pid=3307 comm="tee" name="fd" dev="proc" ino=24189 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:14.676000 audit[3307]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb63799b5 a2=241 a3=1b6 items=1 ppid=3230 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:14.676000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:31:14.676000 audit: PATH item=0 name="/dev/fd/63" inode=25042 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:14.676000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:16.718501 kubelet[2167]: I1213 14:31:16.718447 2167 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:31:16.772000 audit[3335]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:16.772000 audit[3335]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc6cebc500 a2=0 a3=7ffc6cebc4ec items=0 ppid=2350 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:16.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:16.777000 audit[3335]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:16.777000 audit[3335]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc6cebc500 a2=0 a3=7ffc6cebc4ec items=0 ppid=2350 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:16.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:17.271000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.271000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.271000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.271000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.271000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.271000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.271000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.271000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.271000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.271000 audit: BPF prog-id=139 op=LOAD Dec 13 14:31:17.271000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5b532ac0 a2=98 a3=3 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.272000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit: BPF prog-id=140 op=LOAD Dec 13 14:31:17.272000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc5b5328a0 a2=74 a3=540051 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.272000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.272000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.272000 audit: BPF prog-id=141 op=LOAD Dec 13 14:31:17.272000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc5b5328d0 a2=94 a3=2 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.272000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.272000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:31:17.400000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.400000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.400000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.400000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.400000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.400000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.400000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.400000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.400000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.400000 audit: BPF prog-id=142 op=LOAD Dec 13 14:31:17.400000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc5b532790 a2=40 a3=1 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.400000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.400000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:31:17.400000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.400000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc5b532860 a2=50 a3=7ffc5b532940 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.400000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b5327a0 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5b5327d0 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5b5326e0 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b5327f0 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b5327d0 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b5327c0 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b5327f0 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5b5327d0 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5b5327f0 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5b5327c0 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc5b532830 a2=28 a3=0 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc5b5325e0 a2=50 a3=1 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit: BPF prog-id=143 op=LOAD Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc5b5325e0 a2=94 a3=5 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc5b532690 a2=50 a3=1 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc5b5327b0 a2=4 a3=38 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.413000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:17.413000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc5b532800 a2=94 a3=6 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:17.414000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc5b531fb0 a2=94 a3=83 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { bpf } for pid=3390 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: AVC avc: denied { perfmon } for pid=3390 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.414000 audit[3390]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc5b531fb0 a2=94 a3=83 items=0 ppid=3343 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit: BPF prog-id=144 op=LOAD Dec 13 14:31:17.428000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9884a1a0 a2=98 a3=1999999999999999 items=0 ppid=3343 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.428000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:17.428000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit: BPF prog-id=145 op=LOAD Dec 13 14:31:17.428000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9884a080 a2=74 a3=ffff items=0 ppid=3343 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.428000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:17.428000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.428000 audit: BPF prog-id=146 op=LOAD Dec 13 14:31:17.428000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9884a0c0 a2=40 a3=7ffe9884a2a0 items=0 ppid=3343 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.428000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:17.428000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:31:17.524129 systemd-networkd[1032]: vxlan.calico: Link UP Dec 13 14:31:17.524147 systemd-networkd[1032]: vxlan.calico: Gained carrier Dec 13 14:31:17.571000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.571000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.571000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.571000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.571000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.571000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.571000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.571000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.571000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.571000 audit: BPF prog-id=147 op=LOAD Dec 13 14:31:17.571000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6972c1b0 a2=98 a3=ffffffff items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.571000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.571000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit: BPF prog-id=148 op=LOAD Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6972bfc0 a2=74 a3=540051 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit: BPF prog-id=149 op=LOAD Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6972bff0 a2=94 a3=2 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6972bec0 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6972bef0 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6972be00 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6972bf10 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6972bef0 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6972bee0 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6972bf10 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6972bef0 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6972bf10 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6972bee0 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe6972bf50 a2=28 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.572000 audit: BPF prog-id=150 op=LOAD Dec 13 14:31:17.572000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6972bdc0 a2=40 a3=0 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.572000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.572000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:31:17.573000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.573000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe6972bdb0 a2=50 a3=2800 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.573000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.573000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.573000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe6972bdb0 a2=50 a3=2800 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.573000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit: BPF prog-id=151 op=LOAD Dec 13 14:31:17.574000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6972b5d0 a2=94 a3=2 items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.574000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.574000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.574000 audit: BPF prog-id=152 op=LOAD Dec 13 14:31:17.574000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6972b6d0 a2=94 a3=2d items=0 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.574000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit: BPF prog-id=153 op=LOAD Dec 13 14:31:17.603000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd49e73190 a2=98 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.603000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.603000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.603000 audit: BPF prog-id=154 op=LOAD Dec 13 14:31:17.603000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd49e72f70 a2=74 a3=540051 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.603000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.604000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:31:17.604000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.604000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.604000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.604000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.604000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.604000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.604000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.604000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.604000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.604000 audit: BPF prog-id=155 op=LOAD Dec 13 14:31:17.604000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd49e72fa0 a2=94 a3=2 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.604000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.604000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:31:17.695486 env[1234]: time="2024-12-13T14:31:17.695415724Z" level=info msg="StopPodSandbox for \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\"" Dec 13 14:31:17.699022 env[1234]: time="2024-12-13T14:31:17.696174950Z" level=info msg="StopPodSandbox for \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\"" Dec 13 14:31:17.794000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.794000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.794000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.794000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.794000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.794000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.794000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.794000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.794000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.794000 audit: BPF prog-id=156 op=LOAD Dec 13 14:31:17.794000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd49e72e60 a2=40 a3=1 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.794000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.794000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:31:17.794000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.794000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd49e72f30 a2=50 a3=7ffd49e73010 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.794000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e72e70 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd49e72ea0 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd49e72db0 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e72ec0 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e72ea0 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e72e90 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e72ec0 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd49e72ea0 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd49e72ec0 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd49e72e90 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.826000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.826000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd49e72f00 a2=28 a3=0 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.826000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd49e72cb0 a2=50 a3=1 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit: BPF prog-id=157 op=LOAD Dec 13 14:31:17.827000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd49e72cb0 a2=94 a3=5 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.827000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd49e72d60 a2=50 a3=1 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd49e72e80 a2=4 a3=38 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { confidentiality } for pid=3430 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:17.827000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd49e72ed0 a2=94 a3=6 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.827000 audit[3430]: AVC avc: denied { confidentiality } for pid=3430 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:17.827000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd49e72680 a2=94 a3=83 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.827000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { perfmon } for pid=3430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { confidentiality } for pid=3430 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:17.828000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd49e72680 a2=94 a3=83 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.828000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.828000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.828000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd49e740c0 a2=10 a3=f1f00800 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.828000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.829000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.829000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd49e73f60 a2=10 a3=3 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.829000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.829000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.829000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd49e73f00 a2=10 a3=3 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.829000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.829000 audit[3430]: AVC avc: denied { bpf } for pid=3430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:17.829000 audit[3430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd49e73f00 a2=10 a3=7 items=0 ppid=3343 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:17.829000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:17.844000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.860 [INFO][3456] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.860 [INFO][3456] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" iface="eth0" netns="/var/run/netns/cni-8cc56c35-f7e6-cfa8-9159-df3c08dc2a2f" Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.861 [INFO][3456] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" iface="eth0" netns="/var/run/netns/cni-8cc56c35-f7e6-cfa8-9159-df3c08dc2a2f" Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.862 [INFO][3456] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" iface="eth0" netns="/var/run/netns/cni-8cc56c35-f7e6-cfa8-9159-df3c08dc2a2f" Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.862 [INFO][3456] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.862 [INFO][3456] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.947 [INFO][3474] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" HandleID="k8s-pod-network.cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.947 [INFO][3474] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.947 [INFO][3474] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.972 [WARNING][3474] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" HandleID="k8s-pod-network.cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.972 [INFO][3474] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" HandleID="k8s-pod-network.cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.974 [INFO][3474] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:17.984755 env[1234]: 2024-12-13 14:31:17.981 [INFO][3456] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:17.986745 env[1234]: time="2024-12-13T14:31:17.986680526Z" level=info msg="TearDown network for sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\" successfully" Dec 13 14:31:17.986929 env[1234]: time="2024-12-13T14:31:17.986889343Z" level=info msg="StopPodSandbox for \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\" returns successfully" Dec 13 14:31:17.994772 systemd[1]: run-netns-cni\x2d8cc56c35\x2df7e6\x2dcfa8\x2d9159\x2ddf3c08dc2a2f.mount: Deactivated successfully. Dec 13 14:31:17.997397 env[1234]: time="2024-12-13T14:31:17.997339484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-84f5cc5c9f-jcfkf,Uid:cc892c04-22e0-43e8-b63e-0f5712e255b9,Namespace:calico-system,Attempt:1,}" Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:17.907 [INFO][3461] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:17.907 [INFO][3461] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" iface="eth0" netns="/var/run/netns/cni-2cb3c6be-cbea-d121-f337-ffb0c5fd9ffc" Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:17.907 [INFO][3461] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" iface="eth0" netns="/var/run/netns/cni-2cb3c6be-cbea-d121-f337-ffb0c5fd9ffc" Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:17.908 [INFO][3461] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" iface="eth0" netns="/var/run/netns/cni-2cb3c6be-cbea-d121-f337-ffb0c5fd9ffc" Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:17.908 [INFO][3461] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:17.908 [INFO][3461] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:18.016 [INFO][3480] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" HandleID="k8s-pod-network.1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:18.017 [INFO][3480] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:18.017 [INFO][3480] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:18.052 [WARNING][3480] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" HandleID="k8s-pod-network.1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:18.052 [INFO][3480] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" HandleID="k8s-pod-network.1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:18.059 [INFO][3480] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:18.066181 env[1234]: 2024-12-13 14:31:18.064 [INFO][3461] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:18.067790 env[1234]: time="2024-12-13T14:31:18.067728613Z" level=info msg="TearDown network for sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\" successfully" Dec 13 14:31:18.067985 env[1234]: time="2024-12-13T14:31:18.067954464Z" level=info msg="StopPodSandbox for \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\" returns successfully" Dec 13 14:31:18.073949 env[1234]: time="2024-12-13T14:31:18.069529167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77bc4bc975-dpr7m,Uid:badd370c-9501-48de-8db9-744ac371269d,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:31:18.079419 systemd[1]: run-netns-cni\x2d2cb3c6be\x2dcbea\x2dd121\x2df337\x2dffb0c5fd9ffc.mount: Deactivated successfully. Dec 13 14:31:18.319000 audit[3535]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3535 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:18.327634 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 14:31:18.327820 kernel: audit: type=1325 audit(1734100278.319:1099): table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3535 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:18.319000 audit[3535]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdec9c5ee0 a2=0 a3=7ffdec9c5ecc items=0 ppid=3343 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.377769 kernel: audit: type=1300 audit(1734100278.319:1099): arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdec9c5ee0 a2=0 a3=7ffdec9c5ecc items=0 ppid=3343 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.319000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:18.431481 kernel: audit: type=1327 audit(1734100278.319:1099): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:18.399000 audit[3534]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3534 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:18.451731 kernel: audit: type=1325 audit(1734100278.399:1100): table=nat:98 family=2 entries=15 op=nft_register_chain pid=3534 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:18.399000 audit[3534]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd3fc6c300 a2=0 a3=7ffd3fc6c2ec items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.486920 kernel: audit: type=1300 audit(1734100278.399:1100): arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd3fc6c300 a2=0 a3=7ffd3fc6c2ec items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.399000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:18.504980 systemd-networkd[1032]: cali7a08bd90bfd: Link UP Dec 13 14:31:18.514984 kernel: audit: type=1327 audit(1734100278.399:1100): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:18.515179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7a08bd90bfd: link becomes ready Dec 13 14:31:18.533156 kernel: audit: type=1325 audit(1734100278.403:1101): table=raw:99 family=2 entries=21 op=nft_register_chain pid=3536 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:18.403000 audit[3536]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=3536 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:18.521956 systemd-networkd[1032]: cali7a08bd90bfd: Gained carrier Dec 13 14:31:18.403000 audit[3536]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff5b4a18c0 a2=0 a3=7fff5b4a18ac items=0 ppid=3343 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.569261 kernel: audit: type=1300 audit(1734100278.403:1101): arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff5b4a18c0 a2=0 a3=7fff5b4a18ac items=0 ppid=3343 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.595638 kernel: audit: type=1327 audit(1734100278.403:1101): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:18.403000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.203 [INFO][3489] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0 calico-kube-controllers-84f5cc5c9f- calico-system cc892c04-22e0-43e8-b63e-0f5712e255b9 829 0 2024-12-13 14:30:53 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:84f5cc5c9f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal calico-kube-controllers-84f5cc5c9f-jcfkf eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali7a08bd90bfd [] []}} ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Namespace="calico-system" Pod="calico-kube-controllers-84f5cc5c9f-jcfkf" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.204 [INFO][3489] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Namespace="calico-system" Pod="calico-kube-controllers-84f5cc5c9f-jcfkf" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.330 [INFO][3517] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.385 [INFO][3517] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000337120), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", "pod":"calico-kube-controllers-84f5cc5c9f-jcfkf", "timestamp":"2024-12-13 14:31:18.330036732 +0000 UTC"}, Hostname:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.386 [INFO][3517] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.386 [INFO][3517] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.386 [INFO][3517] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.391 [INFO][3517] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.401 [INFO][3517] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.413 [INFO][3517] ipam/ipam.go 489: Trying affinity for 192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.420 [INFO][3517] ipam/ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.427 [INFO][3517] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.427 [INFO][3517] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.430 [INFO][3517] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326 Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.438 [INFO][3517] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.446 [INFO][3517] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.38.193/26] block=192.168.38.192/26 handle="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.446 [INFO][3517] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.193/26] handle="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.446 [INFO][3517] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:18.596354 env[1234]: 2024-12-13 14:31:18.447 [INFO][3517] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.193/26] IPv6=[] ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:18.597499 env[1234]: 2024-12-13 14:31:18.452 [INFO][3489] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Namespace="calico-system" Pod="calico-kube-controllers-84f5cc5c9f-jcfkf" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0", GenerateName:"calico-kube-controllers-84f5cc5c9f-", Namespace:"calico-system", SelfLink:"", UID:"cc892c04-22e0-43e8-b63e-0f5712e255b9", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"84f5cc5c9f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-84f5cc5c9f-jcfkf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7a08bd90bfd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:18.597499 env[1234]: 2024-12-13 14:31:18.458 [INFO][3489] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.38.193/32] ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Namespace="calico-system" Pod="calico-kube-controllers-84f5cc5c9f-jcfkf" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:18.597499 env[1234]: 2024-12-13 14:31:18.458 [INFO][3489] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7a08bd90bfd ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Namespace="calico-system" Pod="calico-kube-controllers-84f5cc5c9f-jcfkf" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:18.597499 env[1234]: 2024-12-13 14:31:18.506 [INFO][3489] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Namespace="calico-system" Pod="calico-kube-controllers-84f5cc5c9f-jcfkf" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:18.597499 env[1234]: 2024-12-13 14:31:18.507 [INFO][3489] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Namespace="calico-system" Pod="calico-kube-controllers-84f5cc5c9f-jcfkf" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0", GenerateName:"calico-kube-controllers-84f5cc5c9f-", Namespace:"calico-system", SelfLink:"", UID:"cc892c04-22e0-43e8-b63e-0f5712e255b9", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"84f5cc5c9f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326", Pod:"calico-kube-controllers-84f5cc5c9f-jcfkf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7a08bd90bfd", MAC:"9e:36:d7:2a:49:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:18.597499 env[1234]: 2024-12-13 14:31:18.542 [INFO][3489] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Namespace="calico-system" Pod="calico-kube-controllers-84f5cc5c9f-jcfkf" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:18.473000 audit[3543]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3543 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:18.616694 kernel: audit: type=1325 audit(1734100278.473:1102): table=filter:100 family=2 entries=39 op=nft_register_chain pid=3543 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:18.473000 audit[3543]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe13b6c980 a2=0 a3=7ffe13b6c96c items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.473000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:18.660000 audit[3565]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3565 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:18.660000 audit[3565]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe117a53f0 a2=0 a3=7ffe117a53dc items=0 ppid=3343 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.660000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:18.671626 env[1234]: time="2024-12-13T14:31:18.671307419Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:18.671626 env[1234]: time="2024-12-13T14:31:18.671382545Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:18.671626 env[1234]: time="2024-12-13T14:31:18.671414309Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:18.672241 env[1234]: time="2024-12-13T14:31:18.672092966Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326 pid=3572 runtime=io.containerd.runc.v2 Dec 13 14:31:18.698343 env[1234]: time="2024-12-13T14:31:18.698285140Z" level=info msg="StopPodSandbox for \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\"" Dec 13 14:31:18.702541 env[1234]: time="2024-12-13T14:31:18.699625648Z" level=info msg="StopPodSandbox for \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\"" Dec 13 14:31:18.704194 env[1234]: time="2024-12-13T14:31:18.699695822Z" level=info msg="StopPodSandbox for \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\"" Dec 13 14:31:18.713726 systemd-networkd[1032]: cali32ef9f669b0: Link UP Dec 13 14:31:18.722733 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:18.730861 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali32ef9f669b0: link becomes ready Dec 13 14:31:18.736423 systemd-networkd[1032]: cali32ef9f669b0: Gained carrier Dec 13 14:31:18.743888 systemd[1]: Started cri-containerd-d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326.scope. Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.266 [INFO][3497] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0 calico-apiserver-77bc4bc975- calico-apiserver badd370c-9501-48de-8db9-744ac371269d 830 0 2024-12-13 14:30:53 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:77bc4bc975 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal calico-apiserver-77bc4bc975-dpr7m eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali32ef9f669b0 [] []}} ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-dpr7m" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.266 [INFO][3497] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-dpr7m" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.573 [INFO][3528] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" HandleID="k8s-pod-network.51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.614 [INFO][3528] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" HandleID="k8s-pod-network.51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318dd0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", "pod":"calico-apiserver-77bc4bc975-dpr7m", "timestamp":"2024-12-13 14:31:18.573680987 +0000 UTC"}, Hostname:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.614 [INFO][3528] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.615 [INFO][3528] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.615 [INFO][3528] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.619 [INFO][3528] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.627 [INFO][3528] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.637 [INFO][3528] ipam/ipam.go 489: Trying affinity for 192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.639 [INFO][3528] ipam/ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.644 [INFO][3528] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.644 [INFO][3528] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.650 [INFO][3528] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0 Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.658 [INFO][3528] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.672 [INFO][3528] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.38.194/26] block=192.168.38.192/26 handle="k8s-pod-network.51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.672 [INFO][3528] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.194/26] handle="k8s-pod-network.51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.672 [INFO][3528] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:18.780823 env[1234]: 2024-12-13 14:31:18.672 [INFO][3528] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.194/26] IPv6=[] ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" HandleID="k8s-pod-network.51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:18.782421 env[1234]: 2024-12-13 14:31:18.677 [INFO][3497] cni-plugin/k8s.go 386: Populated endpoint ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-dpr7m" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0", GenerateName:"calico-apiserver-77bc4bc975-", Namespace:"calico-apiserver", SelfLink:"", UID:"badd370c-9501-48de-8db9-744ac371269d", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77bc4bc975", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-77bc4bc975-dpr7m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali32ef9f669b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:18.782421 env[1234]: 2024-12-13 14:31:18.677 [INFO][3497] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.38.194/32] ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-dpr7m" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:18.782421 env[1234]: 2024-12-13 14:31:18.677 [INFO][3497] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali32ef9f669b0 ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-dpr7m" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:18.782421 env[1234]: 2024-12-13 14:31:18.746 [INFO][3497] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-dpr7m" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:18.782421 env[1234]: 2024-12-13 14:31:18.747 [INFO][3497] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-dpr7m" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0", GenerateName:"calico-apiserver-77bc4bc975-", Namespace:"calico-apiserver", SelfLink:"", UID:"badd370c-9501-48de-8db9-744ac371269d", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77bc4bc975", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0", Pod:"calico-apiserver-77bc4bc975-dpr7m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali32ef9f669b0", MAC:"b2:55:13:ac:fa:5d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:18.782421 env[1234]: 2024-12-13 14:31:18.773 [INFO][3497] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-dpr7m" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:18.845000 audit[3670]: NETFILTER_CFG table=filter:102 family=2 entries=44 op=nft_register_chain pid=3670 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:18.845000 audit[3670]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffeab24d730 a2=0 a3=7ffeab24d71c items=0 ppid=3343 pid=3670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.845000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:18.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.853000 audit: BPF prog-id=158 op=LOAD Dec 13 14:31:18.856000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.856000 audit[3584]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3572 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436363064626662646638323862613633653333633338636535666136 Dec 13 14:31:18.856000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.856000 audit[3584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3572 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436363064626662646638323862613633653333633338636535666136 Dec 13 14:31:18.857000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.857000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.857000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.857000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.857000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.857000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.857000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.857000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.857000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.857000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.857000 audit: BPF prog-id=159 op=LOAD Dec 13 14:31:18.857000 audit[3584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003c4310 items=0 ppid=3572 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436363064626662646638323862613633653333633338636535666136 Dec 13 14:31:18.858000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.858000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.858000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.858000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.858000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.858000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.858000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.858000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.858000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.858000 audit: BPF prog-id=160 op=LOAD Dec 13 14:31:18.858000 audit[3584]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003c4358 items=0 ppid=3572 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436363064626662646638323862613633653333633338636535666136 Dec 13 14:31:18.859000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:31:18.860000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:31:18.860000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.860000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.860000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.860000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.860000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.860000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.860000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.860000 audit[3584]: AVC avc: denied { perfmon } for pid=3584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.860000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.860000 audit[3584]: AVC avc: denied { bpf } for pid=3584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:18.860000 audit: BPF prog-id=161 op=LOAD Dec 13 14:31:18.860000 audit[3584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c4768 items=0 ppid=3572 pid=3584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:18.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436363064626662646638323862613633653333633338636535666136 Dec 13 14:31:18.900981 env[1234]: time="2024-12-13T14:31:18.900857343Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:18.901419 env[1234]: time="2024-12-13T14:31:18.901365878Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:18.901727 env[1234]: time="2024-12-13T14:31:18.901670550Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:18.906807 env[1234]: time="2024-12-13T14:31:18.906733467Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0 pid=3676 runtime=io.containerd.runc.v2 Dec 13 14:31:18.971227 systemd[1]: Started cri-containerd-51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0.scope. Dec 13 14:31:19.000811 env[1234]: time="2024-12-13T14:31:19.000736676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-84f5cc5c9f-jcfkf,Uid:cc892c04-22e0-43e8-b63e-0f5712e255b9,Namespace:calico-system,Attempt:1,} returns sandbox id \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\"" Dec 13 14:31:19.003681 env[1234]: time="2024-12-13T14:31:19.003639243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:31:19.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.038000 audit: BPF prog-id=162 op=LOAD Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3676 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383136623063326132663336643261366563366336363335323730 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3676 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383136623063326132663336643261366563366336363335323730 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit: BPF prog-id=163 op=LOAD Dec 13 14:31:19.039000 audit[3688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002834d0 items=0 ppid=3676 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383136623063326132663336643261366563366336363335323730 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit: BPF prog-id=164 op=LOAD Dec 13 14:31:19.039000 audit[3688]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000283518 items=0 ppid=3676 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383136623063326132663336643261366563366336363335323730 Dec 13 14:31:19.039000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:31:19.039000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { perfmon } for pid=3688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit[3688]: AVC avc: denied { bpf } for pid=3688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.039000 audit: BPF prog-id=165 op=LOAD Dec 13 14:31:19.039000 audit[3688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000283928 items=0 ppid=3676 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383136623063326132663336643261366563366336363335323730 Dec 13 14:31:19.133367 systemd-networkd[1032]: vxlan.calico: Gained IPv6LL Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:18.973 [INFO][3651] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:18.977 [INFO][3651] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" iface="eth0" netns="/var/run/netns/cni-bad46c7f-0f61-c42a-d721-c9bb6b22d290" Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:18.978 [INFO][3651] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" iface="eth0" netns="/var/run/netns/cni-bad46c7f-0f61-c42a-d721-c9bb6b22d290" Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:18.979 [INFO][3651] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" iface="eth0" netns="/var/run/netns/cni-bad46c7f-0f61-c42a-d721-c9bb6b22d290" Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:18.979 [INFO][3651] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:18.979 [INFO][3651] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:19.160 [INFO][3706] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" HandleID="k8s-pod-network.11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:19.161 [INFO][3706] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:19.161 [INFO][3706] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:19.178 [WARNING][3706] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" HandleID="k8s-pod-network.11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:19.179 [INFO][3706] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" HandleID="k8s-pod-network.11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:19.181 [INFO][3706] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:19.185797 env[1234]: 2024-12-13 14:31:19.183 [INFO][3651] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:19.195521 systemd[1]: run-netns-cni\x2dbad46c7f\x2d0f61\x2dc42a\x2dd721\x2dc9bb6b22d290.mount: Deactivated successfully. Dec 13 14:31:19.198304 env[1234]: time="2024-12-13T14:31:19.198235222Z" level=info msg="TearDown network for sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\" successfully" Dec 13 14:31:19.198487 env[1234]: time="2024-12-13T14:31:19.198460411Z" level=info msg="StopPodSandbox for \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\" returns successfully" Dec 13 14:31:19.199747 env[1234]: time="2024-12-13T14:31:19.199701286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t97wl,Uid:35aa5620-1a3c-4a17-abdd-a4aa40940c29,Namespace:calico-system,Attempt:1,}" Dec 13 14:31:19.204692 env[1234]: time="2024-12-13T14:31:19.204564665Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77bc4bc975-dpr7m,Uid:badd370c-9501-48de-8db9-744ac371269d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0\"" Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.076 [INFO][3661] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.076 [INFO][3661] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" iface="eth0" netns="/var/run/netns/cni-d23128e9-274e-677c-459d-564d1a66f4a5" Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.077 [INFO][3661] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" iface="eth0" netns="/var/run/netns/cni-d23128e9-274e-677c-459d-564d1a66f4a5" Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.080 [INFO][3661] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" iface="eth0" netns="/var/run/netns/cni-d23128e9-274e-677c-459d-564d1a66f4a5" Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.080 [INFO][3661] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.080 [INFO][3661] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.254 [INFO][3720] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" HandleID="k8s-pod-network.ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.255 [INFO][3720] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.255 [INFO][3720] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.271 [WARNING][3720] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" HandleID="k8s-pod-network.ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.271 [INFO][3720] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" HandleID="k8s-pod-network.ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.273 [INFO][3720] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:19.282403 env[1234]: 2024-12-13 14:31:19.279 [INFO][3661] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:19.292176 env[1234]: time="2024-12-13T14:31:19.282856581Z" level=info msg="TearDown network for sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\" successfully" Dec 13 14:31:19.292176 env[1234]: time="2024-12-13T14:31:19.282934621Z" level=info msg="StopPodSandbox for \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\" returns successfully" Dec 13 14:31:19.292176 env[1234]: time="2024-12-13T14:31:19.284103954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cgdxk,Uid:e154311b-8fc8-44ae-aa00-4736e84ddf09,Namespace:kube-system,Attempt:1,}" Dec 13 14:31:19.287307 systemd[1]: run-netns-cni\x2dd23128e9\x2d274e\x2d677c\x2d459d\x2d564d1a66f4a5.mount: Deactivated successfully. Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.091 [INFO][3660] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.092 [INFO][3660] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" iface="eth0" netns="/var/run/netns/cni-ac9eaef9-3fea-c004-19f9-d332288e0044" Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.092 [INFO][3660] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" iface="eth0" netns="/var/run/netns/cni-ac9eaef9-3fea-c004-19f9-d332288e0044" Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.093 [INFO][3660] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" iface="eth0" netns="/var/run/netns/cni-ac9eaef9-3fea-c004-19f9-d332288e0044" Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.093 [INFO][3660] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.093 [INFO][3660] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.260 [INFO][3721] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" HandleID="k8s-pod-network.464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.260 [INFO][3721] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.273 [INFO][3721] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.290 [WARNING][3721] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" HandleID="k8s-pod-network.464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.290 [INFO][3721] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" HandleID="k8s-pod-network.464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.292 [INFO][3721] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:19.295736 env[1234]: 2024-12-13 14:31:19.293 [INFO][3660] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:19.296690 env[1234]: time="2024-12-13T14:31:19.295999003Z" level=info msg="TearDown network for sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\" successfully" Dec 13 14:31:19.296690 env[1234]: time="2024-12-13T14:31:19.296043219Z" level=info msg="StopPodSandbox for \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\" returns successfully" Dec 13 14:31:19.297255 env[1234]: time="2024-12-13T14:31:19.297215343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-hxcn9,Uid:5b3ee2f8-79bd-4584-9719-a29cb054948a,Namespace:kube-system,Attempt:1,}" Dec 13 14:31:19.525026 systemd-networkd[1032]: calidc8e0b93157: Link UP Dec 13 14:31:19.534768 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidc8e0b93157: link becomes ready Dec 13 14:31:19.534519 systemd-networkd[1032]: calidc8e0b93157: Gained carrier Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.333 [INFO][3738] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0 csi-node-driver- calico-system 35aa5620-1a3c-4a17-abdd-a4aa40940c29 842 0 2024-12-13 14:30:52 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal csi-node-driver-t97wl eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calidc8e0b93157 [] []}} ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Namespace="calico-system" Pod="csi-node-driver-t97wl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.334 [INFO][3738] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Namespace="calico-system" Pod="csi-node-driver-t97wl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.421 [INFO][3768] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" HandleID="k8s-pod-network.489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.468 [INFO][3768] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" HandleID="k8s-pod-network.489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050d50), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", "pod":"csi-node-driver-t97wl", "timestamp":"2024-12-13 14:31:19.42108586 +0000 UTC"}, Hostname:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.468 [INFO][3768] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.468 [INFO][3768] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.469 [INFO][3768] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.471 [INFO][3768] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.477 [INFO][3768] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.483 [INFO][3768] ipam/ipam.go 489: Trying affinity for 192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.486 [INFO][3768] ipam/ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.489 [INFO][3768] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.489 [INFO][3768] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.491 [INFO][3768] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98 Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.498 [INFO][3768] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.506 [INFO][3768] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.38.195/26] block=192.168.38.192/26 handle="k8s-pod-network.489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.506 [INFO][3768] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.195/26] handle="k8s-pod-network.489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.506 [INFO][3768] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:19.580104 env[1234]: 2024-12-13 14:31:19.506 [INFO][3768] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.195/26] IPv6=[] ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" HandleID="k8s-pod-network.489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:19.582017 env[1234]: 2024-12-13 14:31:19.518 [INFO][3738] cni-plugin/k8s.go 386: Populated endpoint ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Namespace="calico-system" Pod="csi-node-driver-t97wl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"35aa5620-1a3c-4a17-abdd-a4aa40940c29", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-t97wl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.38.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidc8e0b93157", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:19.582017 env[1234]: 2024-12-13 14:31:19.518 [INFO][3738] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.38.195/32] ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Namespace="calico-system" Pod="csi-node-driver-t97wl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:19.582017 env[1234]: 2024-12-13 14:31:19.518 [INFO][3738] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidc8e0b93157 ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Namespace="calico-system" Pod="csi-node-driver-t97wl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:19.582017 env[1234]: 2024-12-13 14:31:19.536 [INFO][3738] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Namespace="calico-system" Pod="csi-node-driver-t97wl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:19.582017 env[1234]: 2024-12-13 14:31:19.537 [INFO][3738] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Namespace="calico-system" Pod="csi-node-driver-t97wl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"35aa5620-1a3c-4a17-abdd-a4aa40940c29", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98", Pod:"csi-node-driver-t97wl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.38.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidc8e0b93157", MAC:"0a:b2:37:a2:6e:b1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:19.582017 env[1234]: 2024-12-13 14:31:19.568 [INFO][3738] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98" Namespace="calico-system" Pod="csi-node-driver-t97wl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:19.639000 audit[3811]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3811 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:19.638501 systemd-networkd[1032]: cali7d7c59f8fbd: Link UP Dec 13 14:31:19.639000 audit[3811]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffd5837f8f0 a2=0 a3=7ffd5837f8dc items=0 ppid=3343 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.639000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:19.655667 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7d7c59f8fbd: link becomes ready Dec 13 14:31:19.656835 systemd-networkd[1032]: cali7d7c59f8fbd: Gained carrier Dec 13 14:31:19.690689 env[1234]: time="2024-12-13T14:31:19.688050955Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:19.690689 env[1234]: time="2024-12-13T14:31:19.688170632Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:19.690689 env[1234]: time="2024-12-13T14:31:19.688234627Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:19.690689 env[1234]: time="2024-12-13T14:31:19.688495639Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98 pid=3820 runtime=io.containerd.runc.v2 Dec 13 14:31:19.700653 env[1234]: time="2024-12-13T14:31:19.696362146Z" level=info msg="StopPodSandbox for \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\"" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.451 [INFO][3755] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0 coredns-76f75df574- kube-system e154311b-8fc8-44ae-aa00-4736e84ddf09 844 0 2024-12-13 14:30:40 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal coredns-76f75df574-cgdxk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7d7c59f8fbd [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Namespace="kube-system" Pod="coredns-76f75df574-cgdxk" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.452 [INFO][3755] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Namespace="kube-system" Pod="coredns-76f75df574-cgdxk" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.538 [INFO][3788] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" HandleID="k8s-pod-network.b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.572 [INFO][3788] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" HandleID="k8s-pod-network.b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011a9d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", "pod":"coredns-76f75df574-cgdxk", "timestamp":"2024-12-13 14:31:19.538502128 +0000 UTC"}, Hostname:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.572 [INFO][3788] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.573 [INFO][3788] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.573 [INFO][3788] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.575 [INFO][3788] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.588 [INFO][3788] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.602 [INFO][3788] ipam/ipam.go 489: Trying affinity for 192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.605 [INFO][3788] ipam/ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.609 [INFO][3788] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.609 [INFO][3788] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.612 [INFO][3788] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16 Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.617 [INFO][3788] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.626 [INFO][3788] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.38.196/26] block=192.168.38.192/26 handle="k8s-pod-network.b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.626 [INFO][3788] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.196/26] handle="k8s-pod-network.b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.626 [INFO][3788] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:19.701251 env[1234]: 2024-12-13 14:31:19.626 [INFO][3788] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.196/26] IPv6=[] ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" HandleID="k8s-pod-network.b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:19.702464 env[1234]: 2024-12-13 14:31:19.630 [INFO][3755] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Namespace="kube-system" Pod="coredns-76f75df574-cgdxk" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e154311b-8fc8-44ae-aa00-4736e84ddf09", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-76f75df574-cgdxk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d7c59f8fbd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:19.702464 env[1234]: 2024-12-13 14:31:19.630 [INFO][3755] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.38.196/32] ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Namespace="kube-system" Pod="coredns-76f75df574-cgdxk" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:19.702464 env[1234]: 2024-12-13 14:31:19.630 [INFO][3755] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7d7c59f8fbd ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Namespace="kube-system" Pod="coredns-76f75df574-cgdxk" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:19.702464 env[1234]: 2024-12-13 14:31:19.660 [INFO][3755] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Namespace="kube-system" Pod="coredns-76f75df574-cgdxk" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:19.702464 env[1234]: 2024-12-13 14:31:19.660 [INFO][3755] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Namespace="kube-system" Pod="coredns-76f75df574-cgdxk" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e154311b-8fc8-44ae-aa00-4736e84ddf09", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16", Pod:"coredns-76f75df574-cgdxk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d7c59f8fbd", MAC:"6a:91:65:29:ab:0d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:19.702464 env[1234]: 2024-12-13 14:31:19.698 [INFO][3755] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16" Namespace="kube-system" Pod="coredns-76f75df574-cgdxk" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:19.780204 systemd[1]: Started cri-containerd-489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98.scope. Dec 13 14:31:19.794000 audit[3872]: NETFILTER_CFG table=filter:104 family=2 entries=52 op=nft_register_chain pid=3872 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:19.794000 audit[3872]: SYSCALL arch=c000003e syscall=46 success=yes exit=25564 a0=3 a1=7ffffd0a9fe0 a2=0 a3=7ffffd0a9fcc items=0 ppid=3343 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.794000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:19.817319 env[1234]: time="2024-12-13T14:31:19.817157574Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:19.817637 env[1234]: time="2024-12-13T14:31:19.817585992Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:19.817814 env[1234]: time="2024-12-13T14:31:19.817781421Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:19.818909 systemd-networkd[1032]: cali36175ed5eac: Link UP Dec 13 14:31:19.819640 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:19.820676 env[1234]: time="2024-12-13T14:31:19.820594043Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16 pid=3875 runtime=io.containerd.runc.v2 Dec 13 14:31:19.828641 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali36175ed5eac: link becomes ready Dec 13 14:31:19.830913 systemd-networkd[1032]: cali36175ed5eac: Gained carrier Dec 13 14:31:19.842724 systemd-networkd[1032]: cali7a08bd90bfd: Gained IPv6LL Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.514 [INFO][3756] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0 coredns-76f75df574- kube-system 5b3ee2f8-79bd-4584-9719-a29cb054948a 845 0 2024-12-13 14:30:40 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal coredns-76f75df574-hxcn9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali36175ed5eac [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Namespace="kube-system" Pod="coredns-76f75df574-hxcn9" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.514 [INFO][3756] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Namespace="kube-system" Pod="coredns-76f75df574-hxcn9" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.719 [INFO][3797] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" HandleID="k8s-pod-network.f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.736 [INFO][3797] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" HandleID="k8s-pod-network.f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290120), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", "pod":"coredns-76f75df574-hxcn9", "timestamp":"2024-12-13 14:31:19.719460677 +0000 UTC"}, Hostname:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.738 [INFO][3797] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.738 [INFO][3797] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.738 [INFO][3797] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.741 [INFO][3797] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.747 [INFO][3797] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.756 [INFO][3797] ipam/ipam.go 489: Trying affinity for 192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.760 [INFO][3797] ipam/ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.765 [INFO][3797] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.766 [INFO][3797] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.771 [INFO][3797] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6 Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.781 [INFO][3797] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.797 [INFO][3797] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.38.197/26] block=192.168.38.192/26 handle="k8s-pod-network.f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.798 [INFO][3797] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.197/26] handle="k8s-pod-network.f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.798 [INFO][3797] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:19.882337 env[1234]: 2024-12-13 14:31:19.798 [INFO][3797] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.197/26] IPv6=[] ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" HandleID="k8s-pod-network.f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:19.883826 env[1234]: 2024-12-13 14:31:19.803 [INFO][3756] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Namespace="kube-system" Pod="coredns-76f75df574-hxcn9" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5b3ee2f8-79bd-4584-9719-a29cb054948a", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-76f75df574-hxcn9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali36175ed5eac", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:19.883826 env[1234]: 2024-12-13 14:31:19.803 [INFO][3756] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.38.197/32] ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Namespace="kube-system" Pod="coredns-76f75df574-hxcn9" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:19.883826 env[1234]: 2024-12-13 14:31:19.803 [INFO][3756] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali36175ed5eac ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Namespace="kube-system" Pod="coredns-76f75df574-hxcn9" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:19.883826 env[1234]: 2024-12-13 14:31:19.841 [INFO][3756] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Namespace="kube-system" Pod="coredns-76f75df574-hxcn9" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:19.883826 env[1234]: 2024-12-13 14:31:19.841 [INFO][3756] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Namespace="kube-system" Pod="coredns-76f75df574-hxcn9" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5b3ee2f8-79bd-4584-9719-a29cb054948a", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6", Pod:"coredns-76f75df574-hxcn9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali36175ed5eac", MAC:"ee:e9:ea:22:3b:80", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:19.883826 env[1234]: 2024-12-13 14:31:19.876 [INFO][3756] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6" Namespace="kube-system" Pod="coredns-76f75df574-hxcn9" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:19.910073 systemd[1]: Started cri-containerd-b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16.scope. Dec 13 14:31:19.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.915000 audit: BPF prog-id=166 op=LOAD Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3820 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438396636373938343937316462636536356236393464396236353061 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3820 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438396636373938343937316462636536356236393464396236353061 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.916000 audit: BPF prog-id=167 op=LOAD Dec 13 14:31:19.916000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003bd000 items=0 ppid=3820 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438396636373938343937316462636536356236393464396236353061 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit: BPF prog-id=168 op=LOAD Dec 13 14:31:19.917000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003bd048 items=0 ppid=3820 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438396636373938343937316462636536356236393464396236353061 Dec 13 14:31:19.917000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:31:19.917000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.917000 audit: BPF prog-id=169 op=LOAD Dec 13 14:31:19.917000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bd458 items=0 ppid=3820 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438396636373938343937316462636536356236393464396236353061 Dec 13 14:31:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.967000 audit: BPF prog-id=170 op=LOAD Dec 13 14:31:19.970418 env[1234]: time="2024-12-13T14:31:19.969419118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t97wl,Uid:35aa5620-1a3c-4a17-abdd-a4aa40940c29,Namespace:calico-system,Attempt:1,} returns sandbox id \"489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98\"" Dec 13 14:31:19.970000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.970000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3875 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230313165363335313537393835356461343235613437353731636464 Dec 13 14:31:19.971000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.971000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3875 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230313165363335313537393835356461343235613437353731636464 Dec 13 14:31:19.974000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.974000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.974000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.974000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.974000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.974000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.974000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.974000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.974000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.974000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.974000 audit: BPF prog-id=171 op=LOAD Dec 13 14:31:19.974000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002cbe90 items=0 ppid=3875 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230313165363335313537393835356461343235613437353731636464 Dec 13 14:31:19.975000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.975000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.975000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.975000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.975000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.975000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.975000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.975000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.975000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.975000 audit: BPF prog-id=172 op=LOAD Dec 13 14:31:19.975000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002cbed8 items=0 ppid=3875 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230313165363335313537393835356461343235613437353731636464 Dec 13 14:31:19.977000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:31:19.978000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:31:19.978000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.978000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.978000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.978000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.978000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.978000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.978000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.978000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.978000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.978000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:19.978000 audit: BPF prog-id=173 op=LOAD Dec 13 14:31:19.978000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00034c2e8 items=0 ppid=3875 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230313165363335313537393835356461343235613437353731636464 Dec 13 14:31:19.983000 audit[3932]: NETFILTER_CFG table=filter:105 family=2 entries=44 op=nft_register_chain pid=3932 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:19.983000 audit[3932]: SYSCALL arch=c000003e syscall=46 success=yes exit=22244 a0=3 a1=7ffdc37b0690 a2=0 a3=7ffdc37b067c items=0 ppid=3343 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.983000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:20.008324 systemd[1]: run-netns-cni\x2dac9eaef9\x2d3fea\x2dc004\x2d19f9\x2dd332288e0044.mount: Deactivated successfully. Dec 13 14:31:20.070349 env[1234]: time="2024-12-13T14:31:20.053376029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:20.070349 env[1234]: time="2024-12-13T14:31:20.053485541Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:20.070349 env[1234]: time="2024-12-13T14:31:20.053531252Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:20.070349 env[1234]: time="2024-12-13T14:31:20.053849954Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6 pid=3940 runtime=io.containerd.runc.v2 Dec 13 14:31:20.119128 env[1234]: time="2024-12-13T14:31:20.118993609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cgdxk,Uid:e154311b-8fc8-44ae-aa00-4736e84ddf09,Namespace:kube-system,Attempt:1,} returns sandbox id \"b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16\"" Dec 13 14:31:20.127387 env[1234]: time="2024-12-13T14:31:20.127252664Z" level=info msg="CreateContainer within sandbox \"b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:31:20.167283 systemd[1]: run-containerd-runc-k8s.io-f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6-runc.b8DRIe.mount: Deactivated successfully. Dec 13 14:31:20.173881 systemd[1]: Started cri-containerd-f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6.scope. Dec 13 14:31:20.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.205000 audit: BPF prog-id=174 op=LOAD Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3940 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637646235326338346661336162323439366331313437323664303234 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3940 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637646235326338346661336162323439366331313437323664303234 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.207000 audit: BPF prog-id=175 op=LOAD Dec 13 14:31:20.207000 audit[3950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002add10 items=0 ppid=3940 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637646235326338346661336162323439366331313437323664303234 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit: BPF prog-id=176 op=LOAD Dec 13 14:31:20.208000 audit[3950]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002add58 items=0 ppid=3940 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637646235326338346661336162323439366331313437323664303234 Dec 13 14:31:20.208000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:31:20.208000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.208000 audit: BPF prog-id=177 op=LOAD Dec 13 14:31:20.208000 audit[3950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00032e168 items=0 ppid=3940 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637646235326338346661336162323439366331313437323664303234 Dec 13 14:31:20.219546 env[1234]: time="2024-12-13T14:31:20.219465743Z" level=info msg="CreateContainer within sandbox \"b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8ea25616205126614bbfbcce482ab5c4bfd2f2635d4b9785eb543c157b88b3fa\"" Dec 13 14:31:20.221191 env[1234]: time="2024-12-13T14:31:20.221123692Z" level=info msg="StartContainer for \"8ea25616205126614bbfbcce482ab5c4bfd2f2635d4b9785eb543c157b88b3fa\"" Dec 13 14:31:20.295945 env[1234]: time="2024-12-13T14:31:20.295856027Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-hxcn9,Uid:5b3ee2f8-79bd-4584-9719-a29cb054948a,Namespace:kube-system,Attempt:1,} returns sandbox id \"f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6\"" Dec 13 14:31:20.302684 env[1234]: time="2024-12-13T14:31:20.302626745Z" level=info msg="CreateContainer within sandbox \"f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:31:20.336973 systemd[1]: Started cri-containerd-8ea25616205126614bbfbcce482ab5c4bfd2f2635d4b9785eb543c157b88b3fa.scope. Dec 13 14:31:20.345330 env[1234]: time="2024-12-13T14:31:20.340211545Z" level=info msg="CreateContainer within sandbox \"f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e0292c7680bc53e6a2e621a6b618c3928fd31b656784315ea3f694bf6632d9db\"" Dec 13 14:31:20.349471 env[1234]: time="2024-12-13T14:31:20.349409519Z" level=info msg="StartContainer for \"e0292c7680bc53e6a2e621a6b618c3928fd31b656784315ea3f694bf6632d9db\"" Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.101 [INFO][3876] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.102 [INFO][3876] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" iface="eth0" netns="/var/run/netns/cni-611ca3c1-b534-a5f8-f066-03cd2dddea55" Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.104 [INFO][3876] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" iface="eth0" netns="/var/run/netns/cni-611ca3c1-b534-a5f8-f066-03cd2dddea55" Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.104 [INFO][3876] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" iface="eth0" netns="/var/run/netns/cni-611ca3c1-b534-a5f8-f066-03cd2dddea55" Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.104 [INFO][3876] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.104 [INFO][3876] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.310 [INFO][3958] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" HandleID="k8s-pod-network.a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.311 [INFO][3958] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.311 [INFO][3958] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.326 [WARNING][3958] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" HandleID="k8s-pod-network.a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.327 [INFO][3958] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" HandleID="k8s-pod-network.a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.330 [INFO][3958] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:20.361466 env[1234]: 2024-12-13 14:31:20.334 [INFO][3876] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:20.363388 env[1234]: time="2024-12-13T14:31:20.362655285Z" level=info msg="TearDown network for sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\" successfully" Dec 13 14:31:20.363388 env[1234]: time="2024-12-13T14:31:20.362706012Z" level=info msg="StopPodSandbox for \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\" returns successfully" Dec 13 14:31:20.363968 env[1234]: time="2024-12-13T14:31:20.363922957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77bc4bc975-nn98q,Uid:bf75ed33-f48d-4643-8a66-df9454f2bfa3,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:31:20.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.406000 audit: BPF prog-id=178 op=LOAD Dec 13 14:31:20.408851 systemd-networkd[1032]: cali32ef9f669b0: Gained IPv6LL Dec 13 14:31:20.409000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.409000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3875 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865613235363136323035313236363134626266626363653438326162 Dec 13 14:31:20.410000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.410000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3875 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865613235363136323035313236363134626266626363653438326162 Dec 13 14:31:20.411000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.411000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.411000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.411000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.411000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.411000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.411000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.411000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.411000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.411000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.411000 audit: BPF prog-id=179 op=LOAD Dec 13 14:31:20.411000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000191100 items=0 ppid=3875 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865613235363136323035313236363134626266626363653438326162 Dec 13 14:31:20.413000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.413000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.413000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.413000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.413000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.413000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.413000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.413000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.413000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.413000 audit: BPF prog-id=180 op=LOAD Dec 13 14:31:20.413000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000191148 items=0 ppid=3875 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865613235363136323035313236363134626266626363653438326162 Dec 13 14:31:20.414000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:31:20.414000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:31:20.414000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.414000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.414000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.414000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.414000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.414000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.414000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.414000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.414000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.414000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.414000 audit: BPF prog-id=181 op=LOAD Dec 13 14:31:20.414000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000191558 items=0 ppid=3875 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865613235363136323035313236363134626266626363653438326162 Dec 13 14:31:20.425415 systemd[1]: Started cri-containerd-e0292c7680bc53e6a2e621a6b618c3928fd31b656784315ea3f694bf6632d9db.scope. Dec 13 14:31:20.477439 env[1234]: time="2024-12-13T14:31:20.477359203Z" level=info msg="StartContainer for \"8ea25616205126614bbfbcce482ab5c4bfd2f2635d4b9785eb543c157b88b3fa\" returns successfully" Dec 13 14:31:20.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.484000 audit: BPF prog-id=182 op=LOAD Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3940 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323932633736383062633533653661326536323161366236313863 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3940 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323932633736383062633533653661326536323161366236313863 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit: BPF prog-id=183 op=LOAD Dec 13 14:31:20.485000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ca000 items=0 ppid=3940 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323932633736383062633533653661326536323161366236313863 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit: BPF prog-id=184 op=LOAD Dec 13 14:31:20.485000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ca048 items=0 ppid=3940 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323932633736383062633533653661326536323161366236313863 Dec 13 14:31:20.485000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:31:20.485000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { perfmon } for pid=4023 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit[4023]: AVC avc: denied { bpf } for pid=4023 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.485000 audit: BPF prog-id=185 op=LOAD Dec 13 14:31:20.485000 audit[4023]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001ca458 items=0 ppid=3940 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530323932633736383062633533653661326536323161366236313863 Dec 13 14:31:20.515861 env[1234]: time="2024-12-13T14:31:20.515790515Z" level=info msg="StartContainer for \"e0292c7680bc53e6a2e621a6b618c3928fd31b656784315ea3f694bf6632d9db\" returns successfully" Dec 13 14:31:20.805668 systemd-networkd[1032]: cali1945618a439: Link UP Dec 13 14:31:20.812839 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1945618a439: link becomes ready Dec 13 14:31:20.813352 systemd-networkd[1032]: cali1945618a439: Gained carrier Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.598 [INFO][4024] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0 calico-apiserver-77bc4bc975- calico-apiserver bf75ed33-f48d-4643-8a66-df9454f2bfa3 860 0 2024-12-13 14:30:53 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:77bc4bc975 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal calico-apiserver-77bc4bc975-nn98q eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1945618a439 [] []}} ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-nn98q" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.598 [INFO][4024] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-nn98q" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.712 [INFO][4070] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" HandleID="k8s-pod-network.57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.736 [INFO][4070] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" HandleID="k8s-pod-network.57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002913b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", "pod":"calico-apiserver-77bc4bc975-nn98q", "timestamp":"2024-12-13 14:31:20.707419047 +0000 UTC"}, Hostname:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.736 [INFO][4070] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.736 [INFO][4070] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.736 [INFO][4070] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.745 [INFO][4070] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.758 [INFO][4070] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.768 [INFO][4070] ipam/ipam.go 489: Trying affinity for 192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.770 [INFO][4070] ipam/ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.774 [INFO][4070] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.774 [INFO][4070] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.776 [INFO][4070] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.786 [INFO][4070] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.795 [INFO][4070] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.38.198/26] block=192.168.38.192/26 handle="k8s-pod-network.57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.795 [INFO][4070] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.198/26] handle="k8s-pod-network.57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.795 [INFO][4070] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:20.838557 env[1234]: 2024-12-13 14:31:20.795 [INFO][4070] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.198/26] IPv6=[] ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" HandleID="k8s-pod-network.57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:20.842216 env[1234]: 2024-12-13 14:31:20.798 [INFO][4024] cni-plugin/k8s.go 386: Populated endpoint ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-nn98q" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0", GenerateName:"calico-apiserver-77bc4bc975-", Namespace:"calico-apiserver", SelfLink:"", UID:"bf75ed33-f48d-4643-8a66-df9454f2bfa3", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77bc4bc975", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-77bc4bc975-nn98q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1945618a439", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:20.842216 env[1234]: 2024-12-13 14:31:20.800 [INFO][4024] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.38.198/32] ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-nn98q" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:20.842216 env[1234]: 2024-12-13 14:31:20.800 [INFO][4024] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1945618a439 ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-nn98q" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:20.842216 env[1234]: 2024-12-13 14:31:20.813 [INFO][4024] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-nn98q" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:20.842216 env[1234]: 2024-12-13 14:31:20.813 [INFO][4024] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-nn98q" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0", GenerateName:"calico-apiserver-77bc4bc975-", Namespace:"calico-apiserver", SelfLink:"", UID:"bf75ed33-f48d-4643-8a66-df9454f2bfa3", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77bc4bc975", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a", Pod:"calico-apiserver-77bc4bc975-nn98q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1945618a439", MAC:"ba:d7:2e:32:9a:2b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:20.842216 env[1234]: 2024-12-13 14:31:20.827 [INFO][4024] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a" Namespace="calico-apiserver" Pod="calico-apiserver-77bc4bc975-nn98q" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:20.856803 systemd-networkd[1032]: cali7d7c59f8fbd: Gained IPv6LL Dec 13 14:31:20.875000 audit[4095]: NETFILTER_CFG table=filter:106 family=2 entries=42 op=nft_register_chain pid=4095 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:20.875000 audit[4095]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffef0eb7340 a2=0 a3=7ffef0eb732c items=0 ppid=3343 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.875000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:20.921131 env[1234]: time="2024-12-13T14:31:20.921007825Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:20.921431 env[1234]: time="2024-12-13T14:31:20.921077515Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:20.921431 env[1234]: time="2024-12-13T14:31:20.921107654Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:20.921431 env[1234]: time="2024-12-13T14:31:20.921316202Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a pid=4102 runtime=io.containerd.runc.v2 Dec 13 14:31:20.954855 systemd[1]: Started cri-containerd-57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a.scope. Dec 13 14:31:20.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.986000 audit: BPF prog-id=186 op=LOAD Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=4102 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303635653865333566306331356165633630633361633331323234 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=4102 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303635653865333566306331356165633630633361633331323234 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit: BPF prog-id=187 op=LOAD Dec 13 14:31:20.987000 audit[4109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000210300 items=0 ppid=4102 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303635653865333566306331356165633630633361633331323234 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.987000 audit: BPF prog-id=188 op=LOAD Dec 13 14:31:20.987000 audit[4109]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000210348 items=0 ppid=4102 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303635653865333566306331356165633630633361633331323234 Dec 13 14:31:20.987000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:31:20.988000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:31:20.988000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.988000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.988000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.988000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.988000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.988000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.988000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.988000 audit[4109]: AVC avc: denied { perfmon } for pid=4109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.988000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.988000 audit[4109]: AVC avc: denied { bpf } for pid=4109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:20.988000 audit: BPF prog-id=189 op=LOAD Dec 13 14:31:20.988000 audit[4109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000210758 items=0 ppid=4102 pid=4109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303635653865333566306331356165633630633361633331323234 Dec 13 14:31:21.007533 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3780262561.mount: Deactivated successfully. Dec 13 14:31:21.009816 systemd[1]: run-netns-cni\x2d611ca3c1\x2db534\x2da5f8\x2df066\x2d03cd2dddea55.mount: Deactivated successfully. Dec 13 14:31:21.069543 env[1234]: time="2024-12-13T14:31:21.069371471Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77bc4bc975-nn98q,Uid:bf75ed33-f48d-4643-8a66-df9454f2bfa3,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a\"" Dec 13 14:31:21.118935 kubelet[2167]: I1213 14:31:21.118882 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-hxcn9" podStartSLOduration=41.118806479 podStartE2EDuration="41.118806479s" podCreationTimestamp="2024-12-13 14:30:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:31:21.116137694 +0000 UTC m=+54.685909375" watchObservedRunningTime="2024-12-13 14:31:21.118806479 +0000 UTC m=+54.688578144" Dec 13 14:31:21.230000 audit[4135]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4135 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:21.230000 audit[4135]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffff973000 a2=0 a3=7fffff972fec items=0 ppid=2350 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:21.230000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:21.232000 audit[4135]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4135 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:21.232000 audit[4135]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffff973000 a2=0 a3=0 items=0 ppid=2350 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:21.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:21.255000 audit[4137]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=4137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:21.255000 audit[4137]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff3e2f42f0 a2=0 a3=7fff3e2f42dc items=0 ppid=2350 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:21.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:21.270000 audit[4137]: NETFILTER_CFG table=nat:110 family=2 entries=47 op=nft_register_chain pid=4137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:21.270000 audit[4137]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff3e2f42f0 a2=0 a3=7fff3e2f42dc items=0 ppid=2350 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:21.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:21.304901 systemd-networkd[1032]: calidc8e0b93157: Gained IPv6LL Dec 13 14:31:21.432946 systemd-networkd[1032]: cali36175ed5eac: Gained IPv6LL Dec 13 14:31:22.083422 env[1234]: time="2024-12-13T14:31:22.083344190Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:22.086070 env[1234]: time="2024-12-13T14:31:22.086018363Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:22.088396 env[1234]: time="2024-12-13T14:31:22.088356662Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:22.090398 env[1234]: time="2024-12-13T14:31:22.090360483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:22.091361 env[1234]: time="2024-12-13T14:31:22.091314650Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:31:22.104637 env[1234]: time="2024-12-13T14:31:22.097940881Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:31:22.119669 env[1234]: time="2024-12-13T14:31:22.117863501Z" level=info msg="CreateContainer within sandbox \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:31:22.144992 env[1234]: time="2024-12-13T14:31:22.144915552Z" level=info msg="CreateContainer within sandbox \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55\"" Dec 13 14:31:22.148083 env[1234]: time="2024-12-13T14:31:22.146121727Z" level=info msg="StartContainer for \"548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55\"" Dec 13 14:31:22.191153 systemd[1]: Started cri-containerd-548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55.scope. Dec 13 14:31:22.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.214000 audit: BPF prog-id=190 op=LOAD Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3572 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:22.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386366313836613633386662316532323963343666383464386464 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3572 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:22.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386366313836613633386662316532323963343666383464386464 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.216000 audit: BPF prog-id=191 op=LOAD Dec 13 14:31:22.216000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c2d30 items=0 ppid=3572 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:22.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386366313836613633386662316532323963343666383464386464 Dec 13 14:31:22.217000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.217000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.217000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.217000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.217000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.217000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.217000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.217000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.217000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.217000 audit: BPF prog-id=192 op=LOAD Dec 13 14:31:22.217000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c2d78 items=0 ppid=3572 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:22.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386366313836613633386662316532323963343666383464386464 Dec 13 14:31:22.218000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:31:22.218000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:31:22.218000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.218000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.218000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.218000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.218000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.218000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.218000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.218000 audit[4150]: AVC avc: denied { perfmon } for pid=4150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.218000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.218000 audit[4150]: AVC avc: denied { bpf } for pid=4150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.218000 audit: BPF prog-id=193 op=LOAD Dec 13 14:31:22.218000 audit[4150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c3188 items=0 ppid=3572 pid=4150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:22.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386366313836613633386662316532323963343666383464386464 Dec 13 14:31:22.268823 env[1234]: time="2024-12-13T14:31:22.268744214Z" level=info msg="StartContainer for \"548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55\" returns successfully" Dec 13 14:31:22.392880 systemd-networkd[1032]: cali1945618a439: Gained IPv6LL Dec 13 14:31:22.546000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:22.546000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c009955aa0 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:31:22.546000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:31:22.546000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:22.546000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c009aca000 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:31:22.546000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:31:22.560000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:22.560000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c009aca060 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:31:22.560000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:31:22.797000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:22.797000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0099e02c0 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:31:22.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:31:22.804000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:22.804000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:22.804000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0098cf640 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:31:22.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:31:22.804000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c009a58000 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:31:22.804000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:31:23.226542 systemd[1]: run-containerd-runc-k8s.io-548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55-runc.uKdjgr.mount: Deactivated successfully. Dec 13 14:31:23.253676 kubelet[2167]: I1213 14:31:23.253626 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-84f5cc5c9f-jcfkf" podStartSLOduration=27.164402031 podStartE2EDuration="30.253508789s" podCreationTimestamp="2024-12-13 14:30:53 +0000 UTC" firstStartedPulling="2024-12-13 14:31:19.002842001 +0000 UTC m=+52.572613671" lastFinishedPulling="2024-12-13 14:31:22.09194876 +0000 UTC m=+55.661720429" observedRunningTime="2024-12-13 14:31:23.245522758 +0000 UTC m=+56.815294444" watchObservedRunningTime="2024-12-13 14:31:23.253508789 +0000 UTC m=+56.823280469" Dec 13 14:31:23.254368 kubelet[2167]: I1213 14:31:23.253807 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-cgdxk" podStartSLOduration=43.253772813 podStartE2EDuration="43.253772813s" podCreationTimestamp="2024-12-13 14:30:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:31:21.194159328 +0000 UTC m=+54.763931009" watchObservedRunningTime="2024-12-13 14:31:23.253772813 +0000 UTC m=+56.823544489" Dec 13 14:31:23.837000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:23.844185 kernel: kauditd_printk_skb: 563 callbacks suppressed Dec 13 14:31:23.844335 kernel: audit: type=1400 audit(1734100283.837:1281): avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:23.837000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ad3ca0 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:31:23.947091 kernel: audit: type=1300 audit(1734100283.837:1281): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ad3ca0 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:31:23.947289 kernel: audit: type=1327 audit(1734100283.837:1281): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:23.837000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:23.870000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:23.984649 kernel: audit: type=1400 audit(1734100283.870:1282): avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:23.870000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0002b3200 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:31:24.019648 kernel: audit: type=1300 audit(1734100283.870:1282): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0002b3200 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:31:23.870000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:24.050653 kernel: audit: type=1327 audit(1734100283.870:1282): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:24.058138 systemd[1]: Started sshd@10-10.128.0.53:22-139.178.68.195:38192.service. Dec 13 14:31:24.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.53:22-139.178.68.195:38192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:24.084653 kernel: audit: type=1130 audit(1734100284.057:1283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.53:22-139.178.68.195:38192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:24.379000 audit[4206]: USER_ACCT pid=4206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:24.412332 kernel: audit: type=1101 audit(1734100284.379:1284): pid=4206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:24.412534 sshd[4206]: Accepted publickey for core from 139.178.68.195 port 38192 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:24.414522 sshd[4206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:24.442558 kernel: audit: type=1103 audit(1734100284.412:1285): pid=4206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:24.412000 audit[4206]: CRED_ACQ pid=4206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:24.413000 audit[4206]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc365cca30 a2=3 a3=0 items=0 ppid=1 pid=4206 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:24.460883 kernel: audit: type=1006 audit(1734100284.413:1286): pid=4206 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:31:24.413000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:24.475693 systemd[1]: Started session-10.scope. Dec 13 14:31:24.482414 systemd-logind[1218]: New session 10 of user core. Dec 13 14:31:24.496000 audit[4206]: USER_START pid=4206 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:24.500000 audit[4208]: CRED_ACQ pid=4208 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:24.855259 sshd[4206]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:24.858000 audit[4206]: USER_END pid=4206 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:24.858000 audit[4206]: CRED_DISP pid=4206 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:24.862779 systemd[1]: sshd@10-10.128.0.53:22-139.178.68.195:38192.service: Deactivated successfully. Dec 13 14:31:24.864245 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:31:24.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.53:22-139.178.68.195:38192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:24.865600 systemd-logind[1218]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:31:24.867424 systemd-logind[1218]: Removed session 10. Dec 13 14:31:25.253451 env[1234]: time="2024-12-13T14:31:25.253383010Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:25.256029 env[1234]: time="2024-12-13T14:31:25.255978230Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:25.258592 env[1234]: time="2024-12-13T14:31:25.258548042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:25.261038 env[1234]: time="2024-12-13T14:31:25.260994889Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:25.262114 env[1234]: time="2024-12-13T14:31:25.262057056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:31:25.265566 env[1234]: time="2024-12-13T14:31:25.265532762Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:31:25.266998 env[1234]: time="2024-12-13T14:31:25.266955957Z" level=info msg="CreateContainer within sandbox \"51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:31:25.298638 env[1234]: time="2024-12-13T14:31:25.298554859Z" level=info msg="CreateContainer within sandbox \"51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d0f83939b062327bf7b8b6a8118ea9f3c300954bd9864184d83efd8f98debcce\"" Dec 13 14:31:25.299720 env[1234]: time="2024-12-13T14:31:25.299671791Z" level=info msg="StartContainer for \"d0f83939b062327bf7b8b6a8118ea9f3c300954bd9864184d83efd8f98debcce\"" Dec 13 14:31:25.372394 systemd[1]: run-containerd-runc-k8s.io-d0f83939b062327bf7b8b6a8118ea9f3c300954bd9864184d83efd8f98debcce-runc.J3zgNp.mount: Deactivated successfully. Dec 13 14:31:25.385298 systemd[1]: Started cri-containerd-d0f83939b062327bf7b8b6a8118ea9f3c300954bd9864184d83efd8f98debcce.scope. Dec 13 14:31:25.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.495000 audit: BPF prog-id=194 op=LOAD Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3676 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:25.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430663833393339623036323332376266376238623661383131386561 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3676 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:25.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430663833393339623036323332376266376238623661383131386561 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.496000 audit: BPF prog-id=195 op=LOAD Dec 13 14:31:25.496000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000292260 items=0 ppid=3676 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:25.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430663833393339623036323332376266376238623661383131386561 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit: BPF prog-id=196 op=LOAD Dec 13 14:31:25.497000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002922a8 items=0 ppid=3676 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:25.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430663833393339623036323332376266376238623661383131386561 Dec 13 14:31:25.497000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:31:25.497000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:25.497000 audit: BPF prog-id=197 op=LOAD Dec 13 14:31:25.497000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002926b8 items=0 ppid=3676 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:25.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430663833393339623036323332376266376238623661383131386561 Dec 13 14:31:25.575786 env[1234]: time="2024-12-13T14:31:25.572180082Z" level=info msg="StartContainer for \"d0f83939b062327bf7b8b6a8118ea9f3c300954bd9864184d83efd8f98debcce\" returns successfully" Dec 13 14:31:26.175247 kubelet[2167]: I1213 14:31:26.175182 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-77bc4bc975-dpr7m" podStartSLOduration=27.118156694 podStartE2EDuration="33.175106763s" podCreationTimestamp="2024-12-13 14:30:53 +0000 UTC" firstStartedPulling="2024-12-13 14:31:19.206794264 +0000 UTC m=+52.776565924" lastFinishedPulling="2024-12-13 14:31:25.263744324 +0000 UTC m=+58.833515993" observedRunningTime="2024-12-13 14:31:26.172821242 +0000 UTC m=+59.742592922" watchObservedRunningTime="2024-12-13 14:31:26.175106763 +0000 UTC m=+59.744878443" Dec 13 14:31:26.250000 audit[4260]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:26.250000 audit[4260]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd86965380 a2=0 a3=7ffd8696536c items=0 ppid=2350 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:26.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:26.263000 audit[4260]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:26.263000 audit[4260]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd86965380 a2=0 a3=7ffd8696536c items=0 ppid=2350 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:26.263000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:26.323915 systemd[1]: run-containerd-runc-k8s.io-49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6-runc.zGUrJ0.mount: Deactivated successfully. Dec 13 14:31:26.642151 systemd[1]: run-containerd-runc-k8s.io-49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6-runc.Pz5ml8.mount: Deactivated successfully. Dec 13 14:31:26.707897 env[1234]: time="2024-12-13T14:31:26.707831924Z" level=info msg="StopPodSandbox for \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\"" Dec 13 14:31:26.823010 env[1234]: time="2024-12-13T14:31:26.822941427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.829008 env[1234]: time="2024-12-13T14:31:26.828953590Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.834598 env[1234]: time="2024-12-13T14:31:26.834551697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.839645 env[1234]: time="2024-12-13T14:31:26.839380313Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.841035 env[1234]: time="2024-12-13T14:31:26.840307662Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:31:26.843124 env[1234]: time="2024-12-13T14:31:26.843088666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:31:26.846694 env[1234]: time="2024-12-13T14:31:26.846362742Z" level=info msg="CreateContainer within sandbox \"489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:31:26.904769 env[1234]: time="2024-12-13T14:31:26.904597628Z" level=info msg="CreateContainer within sandbox \"489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"28213549afb1bd201b3ab4e5f8a8127c3f6c7214fc6e5767c0e7b03cad7b1291\"" Dec 13 14:31:26.906203 env[1234]: time="2024-12-13T14:31:26.906153891Z" level=info msg="StartContainer for \"28213549afb1bd201b3ab4e5f8a8127c3f6c7214fc6e5767c0e7b03cad7b1291\"" Dec 13 14:31:26.974602 systemd[1]: Started cri-containerd-28213549afb1bd201b3ab4e5f8a8127c3f6c7214fc6e5767c0e7b03cad7b1291.scope. Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:26.923 [WARNING][4311] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"35aa5620-1a3c-4a17-abdd-a4aa40940c29", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98", Pod:"csi-node-driver-t97wl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.38.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidc8e0b93157", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:26.923 [INFO][4311] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:26.923 [INFO][4311] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" iface="eth0" netns="" Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:26.923 [INFO][4311] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:26.923 [INFO][4311] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:27.003 [INFO][4328] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" HandleID="k8s-pod-network.11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:27.004 [INFO][4328] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:27.005 [INFO][4328] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:27.029 [WARNING][4328] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" HandleID="k8s-pod-network.11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:27.033 [INFO][4328] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" HandleID="k8s-pod-network.11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:27.038 [INFO][4328] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:27.046206 env[1234]: 2024-12-13 14:31:27.040 [INFO][4311] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:27.047330 env[1234]: time="2024-12-13T14:31:27.047262040Z" level=info msg="TearDown network for sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\" successfully" Dec 13 14:31:27.047490 env[1234]: time="2024-12-13T14:31:27.047455094Z" level=info msg="StopPodSandbox for \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\" returns successfully" Dec 13 14:31:27.048567 env[1234]: time="2024-12-13T14:31:27.048523544Z" level=info msg="RemovePodSandbox for \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\"" Dec 13 14:31:27.048861 env[1234]: time="2024-12-13T14:31:27.048771874Z" level=info msg="Forcibly stopping sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\"" Dec 13 14:31:27.078936 env[1234]: time="2024-12-13T14:31:27.078883169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:27.083036 env[1234]: time="2024-12-13T14:31:27.082995824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:27.085891 env[1234]: time="2024-12-13T14:31:27.085853511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:27.089161 env[1234]: time="2024-12-13T14:31:27.089124226Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:27.089703 env[1234]: time="2024-12-13T14:31:27.089657161Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:31:27.088000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:27.088000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e90d60 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:31:27.088000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:27.088000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:27.088000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e90d80 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:31:27.088000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:27.088000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:27.088000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e90da0 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:31:27.088000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:27.091000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:27.091000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0004dac20 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:31:27.091000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:27.095884 env[1234]: time="2024-12-13T14:31:27.095831224Z" level=info msg="CreateContainer within sandbox \"57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:31:27.111507 env[1234]: time="2024-12-13T14:31:27.111456339Z" level=info msg="CreateContainer within sandbox \"57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d50f2506c9bdd97212712cd652284e074f5d43ab85c75b5da2148f67b50c3c70\"" Dec 13 14:31:27.112565 env[1234]: time="2024-12-13T14:31:27.112528619Z" level=info msg="StartContainer for \"d50f2506c9bdd97212712cd652284e074f5d43ab85c75b5da2148f67b50c3c70\"" Dec 13 14:31:27.162000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.162000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f16ed318b58 items=0 ppid=3820 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:27.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238323133353439616662316264323031623361623465356638613831 Dec 13 14:31:27.167000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.167000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.167000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.167000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.167000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.167000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.167000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.167000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.167000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.167000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.167000 audit: BPF prog-id=198 op=LOAD Dec 13 14:31:27.167000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00034ba18 items=0 ppid=3820 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:27.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238323133353439616662316264323031623361623465356638613831 Dec 13 14:31:27.169000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.169000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.169000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.169000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.169000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.169000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.169000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.169000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.169000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.169000 audit: BPF prog-id=199 op=LOAD Dec 13 14:31:27.169000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00034ba68 items=0 ppid=3820 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:27.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238323133353439616662316264323031623361623465356638613831 Dec 13 14:31:27.170000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:31:27.171000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:31:27.171000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.171000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.171000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.171000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.171000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.171000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.171000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.171000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.171000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.171000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.171000 audit: BPF prog-id=200 op=LOAD Dec 13 14:31:27.171000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00034baf8 items=0 ppid=3820 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:27.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238323133353439616662316264323031623361623465356638613831 Dec 13 14:31:27.228590 systemd[1]: Started cri-containerd-d50f2506c9bdd97212712cd652284e074f5d43ab85c75b5da2148f67b50c3c70.scope. Dec 13 14:31:27.325551 env[1234]: time="2024-12-13T14:31:27.325451733Z" level=info msg="StartContainer for \"28213549afb1bd201b3ab4e5f8a8127c3f6c7214fc6e5767c0e7b03cad7b1291\" returns successfully" Dec 13 14:31:27.353559 env[1234]: time="2024-12-13T14:31:27.353489479Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.261 [WARNING][4366] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"35aa5620-1a3c-4a17-abdd-a4aa40940c29", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98", Pod:"csi-node-driver-t97wl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.38.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calidc8e0b93157", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.261 [INFO][4366] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.261 [INFO][4366] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" iface="eth0" netns="" Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.261 [INFO][4366] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.261 [INFO][4366] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.354 [INFO][4387] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" HandleID="k8s-pod-network.11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.355 [INFO][4387] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.355 [INFO][4387] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.372 [WARNING][4387] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" HandleID="k8s-pod-network.11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.372 [INFO][4387] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" HandleID="k8s-pod-network.11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-csi--node--driver--t97wl-eth0" Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.375 [INFO][4387] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:27.379266 env[1234]: 2024-12-13 14:31:27.377 [INFO][4366] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef" Dec 13 14:31:27.380347 env[1234]: time="2024-12-13T14:31:27.380277940Z" level=info msg="TearDown network for sandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\" successfully" Dec 13 14:31:27.387715 env[1234]: time="2024-12-13T14:31:27.387647568Z" level=info msg="RemovePodSandbox \"11211385e0afcd61b56422a2572574b1b77af174094dd42818600308f854b0ef\" returns successfully" Dec 13 14:31:27.388570 env[1234]: time="2024-12-13T14:31:27.388521724Z" level=info msg="StopPodSandbox for \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\"" Dec 13 14:31:27.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.430000 audit: BPF prog-id=201 op=LOAD Dec 13 14:31:27.430000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.430000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4102 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:27.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435306632353036633962646439373231323731326364363532323834 Dec 13 14:31:27.431000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.431000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4102 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:27.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435306632353036633962646439373231323731326364363532323834 Dec 13 14:31:27.432000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.432000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.432000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.432000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.432000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.432000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.432000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.432000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.432000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.432000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.432000 audit: BPF prog-id=202 op=LOAD Dec 13 14:31:27.432000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024cd0 items=0 ppid=4102 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:27.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435306632353036633962646439373231323731326364363532323834 Dec 13 14:31:27.434000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.434000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.434000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.434000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.434000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.434000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.434000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.434000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.434000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.434000 audit: BPF prog-id=203 op=LOAD Dec 13 14:31:27.434000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024d18 items=0 ppid=4102 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:27.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435306632353036633962646439373231323731326364363532323834 Dec 13 14:31:27.435000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:31:27.435000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:31:27.435000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.435000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.435000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.435000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.435000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.435000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.435000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.435000 audit[4377]: AVC avc: denied { perfmon } for pid=4377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.435000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.435000 audit[4377]: AVC avc: denied { bpf } for pid=4377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:27.435000 audit: BPF prog-id=204 op=LOAD Dec 13 14:31:27.435000 audit[4377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025128 items=0 ppid=4102 pid=4377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:27.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435306632353036633962646439373231323731326364363532323834 Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.485 [WARNING][4422] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e154311b-8fc8-44ae-aa00-4736e84ddf09", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16", Pod:"coredns-76f75df574-cgdxk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d7c59f8fbd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.485 [INFO][4422] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.485 [INFO][4422] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" iface="eth0" netns="" Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.485 [INFO][4422] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.486 [INFO][4422] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.541 [INFO][4428] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" HandleID="k8s-pod-network.ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.541 [INFO][4428] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.541 [INFO][4428] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.551 [WARNING][4428] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" HandleID="k8s-pod-network.ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.551 [INFO][4428] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" HandleID="k8s-pod-network.ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.553 [INFO][4428] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:27.555665 env[1234]: 2024-12-13 14:31:27.554 [INFO][4422] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:27.556604 env[1234]: time="2024-12-13T14:31:27.555720586Z" level=info msg="TearDown network for sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\" successfully" Dec 13 14:31:27.556604 env[1234]: time="2024-12-13T14:31:27.555782587Z" level=info msg="StopPodSandbox for \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\" returns successfully" Dec 13 14:31:27.557548 env[1234]: time="2024-12-13T14:31:27.557487323Z" level=info msg="RemovePodSandbox for \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\"" Dec 13 14:31:27.557722 env[1234]: time="2024-12-13T14:31:27.557553581Z" level=info msg="Forcibly stopping sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\"" Dec 13 14:31:27.673238 env[1234]: time="2024-12-13T14:31:27.673171398Z" level=info msg="StartContainer for \"d50f2506c9bdd97212712cd652284e074f5d43ab85c75b5da2148f67b50c3c70\" returns successfully" Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.699 [WARNING][4447] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e154311b-8fc8-44ae-aa00-4736e84ddf09", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"b011e6351579855da425a47571cddc018d1d2b90923d9c2ab7b432d4bf78be16", Pod:"coredns-76f75df574-cgdxk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7d7c59f8fbd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.699 [INFO][4447] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.699 [INFO][4447] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" iface="eth0" netns="" Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.699 [INFO][4447] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.699 [INFO][4447] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.766 [INFO][4463] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" HandleID="k8s-pod-network.ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.766 [INFO][4463] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.766 [INFO][4463] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.778 [WARNING][4463] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" HandleID="k8s-pod-network.ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.778 [INFO][4463] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" HandleID="k8s-pod-network.ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--cgdxk-eth0" Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.781 [INFO][4463] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:27.785212 env[1234]: 2024-12-13 14:31:27.783 [INFO][4447] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286" Dec 13 14:31:27.785212 env[1234]: time="2024-12-13T14:31:27.785113581Z" level=info msg="TearDown network for sandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\" successfully" Dec 13 14:31:27.791075 env[1234]: time="2024-12-13T14:31:27.790568107Z" level=info msg="RemovePodSandbox \"ce005d255bae53ac46f2407ef982fbd7be9e074dde63be3d5f1404507c091286\" returns successfully" Dec 13 14:31:27.791784 env[1234]: time="2024-12-13T14:31:27.791743001Z" level=info msg="StopPodSandbox for \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\"" Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.893 [WARNING][4481] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0", GenerateName:"calico-kube-controllers-84f5cc5c9f-", Namespace:"calico-system", SelfLink:"", UID:"cc892c04-22e0-43e8-b63e-0f5712e255b9", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"84f5cc5c9f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326", Pod:"calico-kube-controllers-84f5cc5c9f-jcfkf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7a08bd90bfd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.893 [INFO][4481] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.893 [INFO][4481] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" iface="eth0" netns="" Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.893 [INFO][4481] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.893 [INFO][4481] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.956 [INFO][4487] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" HandleID="k8s-pod-network.cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.956 [INFO][4487] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.957 [INFO][4487] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.968 [WARNING][4487] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" HandleID="k8s-pod-network.cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.968 [INFO][4487] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" HandleID="k8s-pod-network.cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.971 [INFO][4487] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:27.975726 env[1234]: 2024-12-13 14:31:27.973 [INFO][4481] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:27.976902 env[1234]: time="2024-12-13T14:31:27.976841270Z" level=info msg="TearDown network for sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\" successfully" Dec 13 14:31:27.977060 env[1234]: time="2024-12-13T14:31:27.977029895Z" level=info msg="StopPodSandbox for \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\" returns successfully" Dec 13 14:31:27.977962 env[1234]: time="2024-12-13T14:31:27.977920341Z" level=info msg="RemovePodSandbox for \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\"" Dec 13 14:31:27.978303 env[1234]: time="2024-12-13T14:31:27.978235974Z" level=info msg="Forcibly stopping sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\"" Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.063 [WARNING][4509] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0", GenerateName:"calico-kube-controllers-84f5cc5c9f-", Namespace:"calico-system", SelfLink:"", UID:"cc892c04-22e0-43e8-b63e-0f5712e255b9", ResourceVersion:"925", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"84f5cc5c9f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326", Pod:"calico-kube-controllers-84f5cc5c9f-jcfkf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7a08bd90bfd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.064 [INFO][4509] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.064 [INFO][4509] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" iface="eth0" netns="" Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.064 [INFO][4509] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.064 [INFO][4509] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.114 [INFO][4515] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" HandleID="k8s-pod-network.cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.114 [INFO][4515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.115 [INFO][4515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.129 [WARNING][4515] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" HandleID="k8s-pod-network.cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.129 [INFO][4515] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" HandleID="k8s-pod-network.cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.132 [INFO][4515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:28.138477 env[1234]: 2024-12-13 14:31:28.134 [INFO][4509] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392" Dec 13 14:31:28.139556 env[1234]: time="2024-12-13T14:31:28.139490913Z" level=info msg="TearDown network for sandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\" successfully" Dec 13 14:31:28.150558 env[1234]: time="2024-12-13T14:31:28.150485746Z" level=info msg="RemovePodSandbox \"cd13fd69951206def7422557c3d3840cc7c336fc91e982404bc08f8c6a035392\" returns successfully" Dec 13 14:31:28.151485 env[1234]: time="2024-12-13T14:31:28.151445114Z" level=info msg="StopPodSandbox for \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\"" Dec 13 14:31:28.188203 kubelet[2167]: I1213 14:31:28.187359 2167 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:31:28.204423 kubelet[2167]: I1213 14:31:28.203110 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-77bc4bc975-nn98q" podStartSLOduration=29.182690553 podStartE2EDuration="35.203044959s" podCreationTimestamp="2024-12-13 14:30:53 +0000 UTC" firstStartedPulling="2024-12-13 14:31:21.071222925 +0000 UTC m=+54.640994585" lastFinishedPulling="2024-12-13 14:31:27.091577331 +0000 UTC m=+60.661348991" observedRunningTime="2024-12-13 14:31:28.198836844 +0000 UTC m=+61.768608525" watchObservedRunningTime="2024-12-13 14:31:28.203044959 +0000 UTC m=+61.772816652" Dec 13 14:31:28.310000 audit[4544]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:28.310000 audit[4544]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff1f60e1f0 a2=0 a3=7fff1f60e1dc items=0 ppid=2350 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.247 [WARNING][4533] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5b3ee2f8-79bd-4584-9719-a29cb054948a", ResourceVersion:"875", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6", Pod:"coredns-76f75df574-hxcn9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali36175ed5eac", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.248 [INFO][4533] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.248 [INFO][4533] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" iface="eth0" netns="" Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.248 [INFO][4533] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.248 [INFO][4533] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.300 [INFO][4540] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" HandleID="k8s-pod-network.464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.301 [INFO][4540] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.301 [INFO][4540] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.311 [WARNING][4540] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" HandleID="k8s-pod-network.464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.311 [INFO][4540] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" HandleID="k8s-pod-network.464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.313 [INFO][4540] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:28.317018 env[1234]: 2024-12-13 14:31:28.315 [INFO][4533] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:28.318107 env[1234]: time="2024-12-13T14:31:28.318044592Z" level=info msg="TearDown network for sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\" successfully" Dec 13 14:31:28.318274 env[1234]: time="2024-12-13T14:31:28.318236797Z" level=info msg="StopPodSandbox for \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\" returns successfully" Dec 13 14:31:28.319204 env[1234]: time="2024-12-13T14:31:28.319164242Z" level=info msg="RemovePodSandbox for \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\"" Dec 13 14:31:28.319420 env[1234]: time="2024-12-13T14:31:28.319356631Z" level=info msg="Forcibly stopping sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\"" Dec 13 14:31:28.322000 audit[4544]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:28.322000 audit[4544]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff1f60e1f0 a2=0 a3=7fff1f60e1dc items=0 ppid=2350 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.322000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.429 [WARNING][4562] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5b3ee2f8-79bd-4584-9719-a29cb054948a", ResourceVersion:"875", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"f7db52c84fa3ab2496c114726d02411b7444604c4840a31ab237abe5f512cee6", Pod:"coredns-76f75df574-hxcn9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.38.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali36175ed5eac", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.429 [INFO][4562] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.430 [INFO][4562] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" iface="eth0" netns="" Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.430 [INFO][4562] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.430 [INFO][4562] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.525 [INFO][4570] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" HandleID="k8s-pod-network.464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.525 [INFO][4570] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.526 [INFO][4570] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.551 [WARNING][4570] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" HandleID="k8s-pod-network.464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.551 [INFO][4570] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" HandleID="k8s-pod-network.464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-coredns--76f75df574--hxcn9-eth0" Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.553 [INFO][4570] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:28.557054 env[1234]: 2024-12-13 14:31:28.555 [INFO][4562] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952" Dec 13 14:31:28.558171 env[1234]: time="2024-12-13T14:31:28.558112612Z" level=info msg="TearDown network for sandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\" successfully" Dec 13 14:31:28.574792 env[1234]: time="2024-12-13T14:31:28.574670367Z" level=info msg="RemovePodSandbox \"464fe18e919642ead54eae568b61dc2c1bf170d80881bbfdbb225598ab0dc952\" returns successfully" Dec 13 14:31:28.576601 env[1234]: time="2024-12-13T14:31:28.576546753Z" level=info msg="StopPodSandbox for \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\"" Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.750 [WARNING][4594] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0", GenerateName:"calico-apiserver-77bc4bc975-", Namespace:"calico-apiserver", SelfLink:"", UID:"badd370c-9501-48de-8db9-744ac371269d", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77bc4bc975", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0", Pod:"calico-apiserver-77bc4bc975-dpr7m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali32ef9f669b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.751 [INFO][4594] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.751 [INFO][4594] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" iface="eth0" netns="" Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.751 [INFO][4594] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.751 [INFO][4594] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.841 [INFO][4600] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" HandleID="k8s-pod-network.1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.841 [INFO][4600] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.841 [INFO][4600] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.855 [WARNING][4600] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" HandleID="k8s-pod-network.1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.855 [INFO][4600] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" HandleID="k8s-pod-network.1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.858 [INFO][4600] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:28.862956 env[1234]: 2024-12-13 14:31:28.860 [INFO][4594] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:28.862956 env[1234]: time="2024-12-13T14:31:28.862920521Z" level=info msg="TearDown network for sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\" successfully" Dec 13 14:31:28.864361 env[1234]: time="2024-12-13T14:31:28.863000802Z" level=info msg="StopPodSandbox for \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\" returns successfully" Dec 13 14:31:28.866342 env[1234]: time="2024-12-13T14:31:28.864682036Z" level=info msg="RemovePodSandbox for \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\"" Dec 13 14:31:28.866342 env[1234]: time="2024-12-13T14:31:28.864738346Z" level=info msg="Forcibly stopping sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\"" Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.029 [WARNING][4622] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0", GenerateName:"calico-apiserver-77bc4bc975-", Namespace:"calico-apiserver", SelfLink:"", UID:"badd370c-9501-48de-8db9-744ac371269d", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77bc4bc975", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"51816b0c2a2f36d2a6ec6c66352704cb2ba7f158cd2ec028fbcaa68351b030e0", Pod:"calico-apiserver-77bc4bc975-dpr7m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali32ef9f669b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.029 [INFO][4622] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.029 [INFO][4622] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" iface="eth0" netns="" Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.029 [INFO][4622] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.029 [INFO][4622] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.119 [INFO][4628] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" HandleID="k8s-pod-network.1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.120 [INFO][4628] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.120 [INFO][4628] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.140 [WARNING][4628] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" HandleID="k8s-pod-network.1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.140 [INFO][4628] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" HandleID="k8s-pod-network.1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--dpr7m-eth0" Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.144 [INFO][4628] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:29.148561 env[1234]: 2024-12-13 14:31:29.146 [INFO][4622] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2" Dec 13 14:31:29.148561 env[1234]: time="2024-12-13T14:31:29.148513024Z" level=info msg="TearDown network for sandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\" successfully" Dec 13 14:31:29.153730 env[1234]: time="2024-12-13T14:31:29.153653589Z" level=info msg="RemovePodSandbox \"1a91629d4dba0c9569c676f991638004623782f84604916dc57987e0a7d08dd2\" returns successfully" Dec 13 14:31:29.154699 env[1234]: time="2024-12-13T14:31:29.154653320Z" level=info msg="StopPodSandbox for \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\"" Dec 13 14:31:29.203955 kernel: kauditd_printk_skb: 188 callbacks suppressed Dec 13 14:31:29.204182 kernel: audit: type=1400 audit(1734100289.167:1342): avc: denied { watch } for pid=4237 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_31_03.236315408/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c897 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1,c897 tclass=file permissive=0 Dec 13 14:31:29.167000 audit[4237]: AVC avc: denied { watch } for pid=4237 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_31_03.236315408/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c897 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1,c897 tclass=file permissive=0 Dec 13 14:31:29.167000 audit[4237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001131ba0 a2=fc6 a3=0 items=0 ppid=3676 pid=4237 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c897 key=(null) Dec 13 14:31:29.240220 kubelet[2167]: I1213 14:31:29.220038 2167 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:31:29.250292 kernel: audit: type=1300 audit(1734100289.167:1342): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001131ba0 a2=fc6 a3=0 items=0 ppid=3676 pid=4237 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c897 key=(null) Dec 13 14:31:29.167000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:31:29.283726 kernel: audit: type=1327 audit(1734100289.167:1342): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:31:29.473000 audit[4655]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:29.492655 kernel: audit: type=1325 audit(1734100289.473:1343): table=filter:115 family=2 entries=9 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:29.473000 audit[4655]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe3e283d90 a2=0 a3=7ffe3e283d7c items=0 ppid=2350 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.533079 kernel: audit: type=1300 audit(1734100289.473:1343): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe3e283d90 a2=0 a3=7ffe3e283d7c items=0 ppid=2350 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:29.568701 kernel: audit: type=1327 audit(1734100289.473:1343): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:29.497000 audit[4655]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:29.592757 kernel: audit: type=1325 audit(1734100289.497:1344): table=nat:116 family=2 entries=27 op=nft_register_chain pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:29.593840 kernel: audit: type=1300 audit(1734100289.497:1344): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe3e283d90 a2=0 a3=7ffe3e283d7c items=0 ppid=2350 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.497000 audit[4655]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe3e283d90 a2=0 a3=7ffe3e283d7c items=0 ppid=2350 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:29.642020 kernel: audit: type=1327 audit(1734100289.497:1344): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:29.664020 env[1234]: time="2024-12-13T14:31:29.663948622Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:29.667479 env[1234]: time="2024-12-13T14:31:29.667428224Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:29.669944 env[1234]: time="2024-12-13T14:31:29.669895550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:29.677588 env[1234]: time="2024-12-13T14:31:29.677538401Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:29.680574 env[1234]: time="2024-12-13T14:31:29.678668125Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:31:29.682542 env[1234]: time="2024-12-13T14:31:29.682431230Z" level=info msg="CreateContainer within sandbox \"489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.459 [WARNING][4648] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0", GenerateName:"calico-apiserver-77bc4bc975-", Namespace:"calico-apiserver", SelfLink:"", UID:"bf75ed33-f48d-4643-8a66-df9454f2bfa3", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77bc4bc975", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a", Pod:"calico-apiserver-77bc4bc975-nn98q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1945618a439", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.460 [INFO][4648] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.460 [INFO][4648] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" iface="eth0" netns="" Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.460 [INFO][4648] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.460 [INFO][4648] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.639 [INFO][4656] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" HandleID="k8s-pod-network.a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.640 [INFO][4656] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.640 [INFO][4656] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.671 [WARNING][4656] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" HandleID="k8s-pod-network.a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.671 [INFO][4656] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" HandleID="k8s-pod-network.a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.675 [INFO][4656] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:29.683019 env[1234]: 2024-12-13 14:31:29.680 [INFO][4648] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:29.683957 env[1234]: time="2024-12-13T14:31:29.683919156Z" level=info msg="TearDown network for sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\" successfully" Dec 13 14:31:29.684121 env[1234]: time="2024-12-13T14:31:29.684089070Z" level=info msg="StopPodSandbox for \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\" returns successfully" Dec 13 14:31:29.687939 env[1234]: time="2024-12-13T14:31:29.687900073Z" level=info msg="RemovePodSandbox for \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\"" Dec 13 14:31:29.688167 env[1234]: time="2024-12-13T14:31:29.688094698Z" level=info msg="Forcibly stopping sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\"" Dec 13 14:31:29.764045 env[1234]: time="2024-12-13T14:31:29.763844256Z" level=info msg="CreateContainer within sandbox \"489f67984971dbce65b694d9b650a7c24f6f87b40fe17d059edf97f968c2ae98\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"435b05b6b9c7eba05b95d73d320e00983c5d7b0229c1a5d337e3fdcfbb0a596e\"" Dec 13 14:31:29.765578 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount468687546.mount: Deactivated successfully. Dec 13 14:31:29.773641 env[1234]: time="2024-12-13T14:31:29.766991919Z" level=info msg="StartContainer for \"435b05b6b9c7eba05b95d73d320e00983c5d7b0229c1a5d337e3fdcfbb0a596e\"" Dec 13 14:31:29.894188 systemd[1]: Started cri-containerd-435b05b6b9c7eba05b95d73d320e00983c5d7b0229c1a5d337e3fdcfbb0a596e.scope. Dec 13 14:31:29.930907 systemd[1]: Started sshd@11-10.128.0.53:22-139.178.68.195:40466.service. Dec 13 14:31:29.959829 kernel: audit: type=1130 audit(1734100289.932:1345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.53:22-139.178.68.195:40466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:29.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.53:22-139.178.68.195:40466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7efc4b73ea18 items=0 ppid=3820 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356230356236623963376562613035623935643733643332306530 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit: BPF prog-id=205 op=LOAD Dec 13 14:31:29.987000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000178d78 items=0 ppid=3820 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356230356236623963376562613035623935643733643332306530 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit: BPF prog-id=206 op=LOAD Dec 13 14:31:29.987000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000178dc8 items=0 ppid=3820 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356230356236623963376562613035623935643733643332306530 Dec 13 14:31:29.987000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:31:29.987000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.987000 audit: BPF prog-id=207 op=LOAD Dec 13 14:31:29.987000 audit[4687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000178e58 items=0 ppid=3820 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356230356236623963376562613035623935643733643332306530 Dec 13 14:31:30.034818 env[1234]: time="2024-12-13T14:31:30.032048217Z" level=info msg="StartContainer for \"435b05b6b9c7eba05b95d73d320e00983c5d7b0229c1a5d337e3fdcfbb0a596e\" returns successfully" Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:29.968 [WARNING][4675] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0", GenerateName:"calico-apiserver-77bc4bc975-", Namespace:"calico-apiserver", SelfLink:"", UID:"bf75ed33-f48d-4643-8a66-df9454f2bfa3", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77bc4bc975", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"57065e8e35f0c15aec60c3ac312246ad7ceb20d405fe65bc91d089cb1580771a", Pod:"calico-apiserver-77bc4bc975-nn98q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.38.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1945618a439", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:29.969 [INFO][4675] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:29.969 [INFO][4675] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" iface="eth0" netns="" Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:29.969 [INFO][4675] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:29.969 [INFO][4675] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:30.041 [INFO][4709] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" HandleID="k8s-pod-network.a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:30.042 [INFO][4709] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:30.042 [INFO][4709] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:30.053 [WARNING][4709] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" HandleID="k8s-pod-network.a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:30.053 [INFO][4709] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" HandleID="k8s-pod-network.a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--apiserver--77bc4bc975--nn98q-eth0" Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:30.057 [INFO][4709] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:30.061421 env[1234]: 2024-12-13 14:31:30.059 [INFO][4675] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670" Dec 13 14:31:30.062536 env[1234]: time="2024-12-13T14:31:30.062479931Z" level=info msg="TearDown network for sandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\" successfully" Dec 13 14:31:30.069682 env[1234]: time="2024-12-13T14:31:30.069599965Z" level=info msg="RemovePodSandbox \"a37f5e296bbeced0c5f760d29c0389960f0f93faad26ecd36dd645c82802b670\" returns successfully" Dec 13 14:31:30.249651 kubelet[2167]: I1213 14:31:30.249562 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-t97wl" podStartSLOduration=28.541803019 podStartE2EDuration="38.249447695s" podCreationTimestamp="2024-12-13 14:30:52 +0000 UTC" firstStartedPulling="2024-12-13 14:31:19.972204715 +0000 UTC m=+53.541976376" lastFinishedPulling="2024-12-13 14:31:29.679849391 +0000 UTC m=+63.249621052" observedRunningTime="2024-12-13 14:31:30.248979273 +0000 UTC m=+63.818750953" watchObservedRunningTime="2024-12-13 14:31:30.249447695 +0000 UTC m=+63.819219376" Dec 13 14:31:30.249000 audit[4707]: USER_ACCT pid=4707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:30.252986 sshd[4707]: Accepted publickey for core from 139.178.68.195 port 40466 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:30.254000 audit[4707]: CRED_ACQ pid=4707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:30.255000 audit[4707]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcda42e10 a2=3 a3=0 items=0 ppid=1 pid=4707 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:30.255000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:30.257403 sshd[4707]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:30.268484 systemd-logind[1218]: New session 11 of user core. Dec 13 14:31:30.268835 systemd[1]: Started session-11.scope. Dec 13 14:31:30.278000 audit[4707]: USER_START pid=4707 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:30.281000 audit[4728]: CRED_ACQ pid=4728 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:30.623882 sshd[4707]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:30.624000 audit[4707]: USER_END pid=4707 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:30.624000 audit[4707]: CRED_DISP pid=4707 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:30.630144 systemd-logind[1218]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:31:30.631052 systemd[1]: sshd@11-10.128.0.53:22-139.178.68.195:40466.service: Deactivated successfully. Dec 13 14:31:30.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.53:22-139.178.68.195:40466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:30.632441 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:31:30.634364 systemd-logind[1218]: Removed session 11. Dec 13 14:31:30.927839 kubelet[2167]: I1213 14:31:30.927674 2167 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:31:30.928133 kubelet[2167]: I1213 14:31:30.928112 2167 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:31:31.055000 audit[4399]: AVC avc: denied { watch } for pid=4399 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_31_03.2481532512/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c644 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c224,c644 tclass=file permissive=0 Dec 13 14:31:31.055000 audit[4399]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000765be0 a2=fc6 a3=0 items=0 ppid=4102 pid=4399 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c644 key=(null) Dec 13 14:31:31.055000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:31:32.683484 kubelet[2167]: I1213 14:31:32.683303 2167 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:31:32.741000 audit[4740]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:32.741000 audit[4740]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd7cafbcd0 a2=0 a3=7ffd7cafbcbc items=0 ppid=2350 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:32.741000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:32.748000 audit[4740]: NETFILTER_CFG table=nat:118 family=2 entries=34 op=nft_register_chain pid=4740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:32.748000 audit[4740]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd7cafbcd0 a2=0 a3=7ffd7cafbcbc items=0 ppid=2350 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:32.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:33.544283 systemd[1]: run-containerd-runc-k8s.io-548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55-runc.x5nYQA.mount: Deactivated successfully. Dec 13 14:31:35.672811 systemd[1]: Started sshd@12-10.128.0.53:22-139.178.68.195:40480.service. Dec 13 14:31:35.706056 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:31:35.706242 kernel: audit: type=1130 audit(1734100295.673:1363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.53:22-139.178.68.195:40480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:35.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.53:22-139.178.68.195:40480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:35.979000 audit[4763]: USER_ACCT pid=4763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.010393 sshd[4763]: Accepted publickey for core from 139.178.68.195 port 40480 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:36.010939 kernel: audit: type=1101 audit(1734100295.979:1364): pid=4763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.009000 audit[4763]: CRED_ACQ pid=4763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.011553 sshd[4763]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:36.023569 systemd[1]: Started session-12.scope. Dec 13 14:31:36.026600 systemd-logind[1218]: New session 12 of user core. Dec 13 14:31:36.039946 kernel: audit: type=1103 audit(1734100296.009:1365): pid=4763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.009000 audit[4763]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd8ca6f60 a2=3 a3=0 items=0 ppid=1 pid=4763 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:36.056897 kernel: audit: type=1006 audit(1734100296.009:1366): pid=4763 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:31:36.056974 kernel: audit: type=1300 audit(1734100296.009:1366): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd8ca6f60 a2=3 a3=0 items=0 ppid=1 pid=4763 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:36.009000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:36.094664 kernel: audit: type=1327 audit(1734100296.009:1366): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:36.094871 kernel: audit: type=1105 audit(1734100296.039:1367): pid=4763 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.039000 audit[4763]: USER_START pid=4763 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.044000 audit[4765]: CRED_ACQ pid=4765 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.128708 kernel: audit: type=1103 audit(1734100296.044:1368): pid=4765 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.316723 sshd[4763]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:36.318000 audit[4763]: USER_END pid=4763 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.324000 audit[4763]: CRED_DISP pid=4763 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.358856 systemd[1]: sshd@12-10.128.0.53:22-139.178.68.195:40480.service: Deactivated successfully. Dec 13 14:31:36.360418 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:31:36.364039 systemd-logind[1218]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:31:36.367247 systemd-logind[1218]: Removed session 12. Dec 13 14:31:36.376839 kernel: audit: type=1106 audit(1734100296.318:1369): pid=4763 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.377070 kernel: audit: type=1104 audit(1734100296.324:1370): pid=4763 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.53:22-139.178.68.195:40480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.390246 systemd[1]: Started sshd@13-10.128.0.53:22-139.178.68.195:52968.service. Dec 13 14:31:36.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.53:22-139.178.68.195:52968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.698000 audit[4775]: USER_ACCT pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.702490 sshd[4775]: Accepted publickey for core from 139.178.68.195 port 52968 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:36.705000 audit[4775]: CRED_ACQ pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.705000 audit[4775]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec55677a0 a2=3 a3=0 items=0 ppid=1 pid=4775 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:36.705000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:36.707514 sshd[4775]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:36.717580 systemd-logind[1218]: New session 13 of user core. Dec 13 14:31:36.718892 systemd[1]: Started session-13.scope. Dec 13 14:31:36.729000 audit[4775]: USER_START pid=4775 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:36.733000 audit[4777]: CRED_ACQ pid=4777 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:37.160000 audit[4775]: USER_END pid=4775 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:37.158349 sshd[4775]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:37.160000 audit[4775]: CRED_DISP pid=4775 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:37.165084 systemd-logind[1218]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:31:37.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.53:22-139.178.68.195:52968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:37.167807 systemd[1]: sshd@13-10.128.0.53:22-139.178.68.195:52968.service: Deactivated successfully. Dec 13 14:31:37.169410 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:31:37.174676 systemd-logind[1218]: Removed session 13. Dec 13 14:31:37.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.53:22-139.178.68.195:52976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:37.211061 systemd[1]: Started sshd@14-10.128.0.53:22-139.178.68.195:52976.service. Dec 13 14:31:37.506000 audit[4785]: USER_ACCT pid=4785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:37.507445 sshd[4785]: Accepted publickey for core from 139.178.68.195 port 52976 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:37.508000 audit[4785]: CRED_ACQ pid=4785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:37.508000 audit[4785]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaf14b010 a2=3 a3=0 items=0 ppid=1 pid=4785 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:37.508000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:37.510176 sshd[4785]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:37.517761 systemd-logind[1218]: New session 14 of user core. Dec 13 14:31:37.519115 systemd[1]: Started session-14.scope. Dec 13 14:31:37.528000 audit[4785]: USER_START pid=4785 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:37.531000 audit[4787]: CRED_ACQ pid=4787 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:37.854997 sshd[4785]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:37.856000 audit[4785]: USER_END pid=4785 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:37.856000 audit[4785]: CRED_DISP pid=4785 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:37.860837 systemd[1]: sshd@14-10.128.0.53:22-139.178.68.195:52976.service: Deactivated successfully. Dec 13 14:31:37.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.53:22-139.178.68.195:52976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:37.862326 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:31:37.863161 systemd-logind[1218]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:31:37.864828 systemd-logind[1218]: Removed session 14. Dec 13 14:31:38.632139 systemd[1]: sshd@1-10.128.0.53:22-218.92.0.207:63576.service: Deactivated successfully. Dec 13 14:31:38.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@1-10.128.0.53:22-218.92.0.207:63576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:42.901796 systemd[1]: Started sshd@15-10.128.0.53:22-139.178.68.195:52988.service. Dec 13 14:31:42.923183 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 14:31:42.923316 kernel: audit: type=1130 audit(1734100302.901:1391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.53:22-139.178.68.195:52988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:42.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.53:22-139.178.68.195:52988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:43.198000 audit[4810]: USER_ACCT pid=4810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.199566 sshd[4810]: Accepted publickey for core from 139.178.68.195 port 52988 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:43.228649 kernel: audit: type=1101 audit(1734100303.198:1392): pid=4810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.228000 audit[4810]: CRED_ACQ pid=4810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.230456 sshd[4810]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:43.241766 systemd[1]: Started session-15.scope. Dec 13 14:31:43.244178 systemd-logind[1218]: New session 15 of user core. Dec 13 14:31:43.255992 kernel: audit: type=1103 audit(1734100303.228:1393): pid=4810 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.273645 kernel: audit: type=1006 audit(1734100303.228:1394): pid=4810 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:31:43.273829 kernel: audit: type=1300 audit(1734100303.228:1394): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd1e58ca0 a2=3 a3=0 items=0 ppid=1 pid=4810 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.228000 audit[4810]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd1e58ca0 a2=3 a3=0 items=0 ppid=1 pid=4810 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.228000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:43.301774 kernel: audit: type=1327 audit(1734100303.228:1394): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:43.254000 audit[4810]: USER_START pid=4810 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.310823 kernel: audit: type=1105 audit(1734100303.254:1395): pid=4810 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.260000 audit[4812]: CRED_ACQ pid=4812 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.367466 kernel: audit: type=1103 audit(1734100303.260:1396): pid=4812 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.520223 sshd[4810]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:43.522000 audit[4810]: USER_END pid=4810 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.526132 systemd-logind[1218]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:31:43.528604 systemd[1]: sshd@15-10.128.0.53:22-139.178.68.195:52988.service: Deactivated successfully. Dec 13 14:31:43.530015 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:31:43.532286 systemd-logind[1218]: Removed session 15. Dec 13 14:31:43.522000 audit[4810]: CRED_DISP pid=4810 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.555856 kernel: audit: type=1106 audit(1734100303.522:1397): pid=4810 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.555925 kernel: audit: type=1104 audit(1734100303.522:1398): pid=4810 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:43.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.53:22-139.178.68.195:52988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:48.570797 systemd[1]: Started sshd@16-10.128.0.53:22-139.178.68.195:43772.service. Dec 13 14:31:48.602412 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:31:48.602502 kernel: audit: type=1130 audit(1734100308.570:1400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.53:22-139.178.68.195:43772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:48.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.53:22-139.178.68.195:43772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:48.876000 audit[4845]: USER_ACCT pid=4845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:48.908478 sshd[4845]: Accepted publickey for core from 139.178.68.195 port 43772 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:48.909070 kernel: audit: type=1101 audit(1734100308.876:1401): pid=4845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:48.909393 sshd[4845]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:48.906000 audit[4845]: CRED_ACQ pid=4845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:48.926002 systemd-logind[1218]: New session 16 of user core. Dec 13 14:31:48.940849 kernel: audit: type=1103 audit(1734100308.906:1402): pid=4845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:48.941026 kernel: audit: type=1006 audit(1734100308.907:1403): pid=4845 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:31:48.942058 systemd[1]: Started session-16.scope. Dec 13 14:31:48.958026 kernel: audit: type=1300 audit(1734100308.907:1403): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca6f07ca0 a2=3 a3=0 items=0 ppid=1 pid=4845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:48.907000 audit[4845]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca6f07ca0 a2=3 a3=0 items=0 ppid=1 pid=4845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:48.907000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:48.995419 kernel: audit: type=1327 audit(1734100308.907:1403): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:48.995768 kernel: audit: type=1105 audit(1734100308.950:1404): pid=4845 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:48.950000 audit[4845]: USER_START pid=4845 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:48.955000 audit[4848]: CRED_ACQ pid=4848 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:49.052146 kernel: audit: type=1103 audit(1734100308.955:1405): pid=4848 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:49.241998 sshd[4845]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:49.242000 audit[4845]: USER_END pid=4845 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:49.247991 systemd-logind[1218]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:31:49.250723 systemd[1]: sshd@16-10.128.0.53:22-139.178.68.195:43772.service: Deactivated successfully. Dec 13 14:31:49.252184 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:31:49.254887 systemd-logind[1218]: Removed session 16. Dec 13 14:31:49.243000 audit[4845]: CRED_DISP pid=4845 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:49.277821 kernel: audit: type=1106 audit(1734100309.242:1406): pid=4845 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:49.277906 kernel: audit: type=1104 audit(1734100309.243:1407): pid=4845 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:49.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.53:22-139.178.68.195:43772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:53.501078 env[1234]: time="2024-12-13T14:31:53.500982063Z" level=info msg="StopContainer for \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\" with timeout 300 (s)" Dec 13 14:31:53.501850 env[1234]: time="2024-12-13T14:31:53.501787784Z" level=info msg="Stop container \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\" with signal terminated" Dec 13 14:31:53.604000 audit[4864]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:53.610505 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:31:53.610725 kernel: audit: type=1325 audit(1734100313.604:1409): table=filter:119 family=2 entries=8 op=nft_register_rule pid=4864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:53.604000 audit[4864]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd301d9e80 a2=0 a3=7ffd301d9e6c items=0 ppid=2350 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:53.696845 kernel: audit: type=1300 audit(1734100313.604:1409): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd301d9e80 a2=0 a3=7ffd301d9e6c items=0 ppid=2350 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.697073 kernel: audit: type=1327 audit(1734100313.604:1409): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:53.647000 audit[4864]: NETFILTER_CFG table=nat:120 family=2 entries=30 op=nft_register_rule pid=4864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:53.713319 kernel: audit: type=1325 audit(1734100313.647:1410): table=nat:120 family=2 entries=30 op=nft_register_rule pid=4864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:53.647000 audit[4864]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd301d9e80 a2=0 a3=7ffd301d9e6c items=0 ppid=2350 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.747668 kernel: audit: type=1300 audit(1734100313.647:1410): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd301d9e80 a2=0 a3=7ffd301d9e6c items=0 ppid=2350 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:53.764992 kernel: audit: type=1327 audit(1734100313.647:1410): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:53.774927 env[1234]: time="2024-12-13T14:31:53.774861557Z" level=info msg="StopContainer for \"548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55\" with timeout 30 (s)" Dec 13 14:31:53.775591 env[1234]: time="2024-12-13T14:31:53.775534597Z" level=info msg="Stop container \"548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55\" with signal terminated" Dec 13 14:31:53.810335 kernel: audit: type=1334 audit(1734100313.800:1411): prog-id=190 op=UNLOAD Dec 13 14:31:53.800000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:31:53.800951 systemd[1]: cri-containerd-548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55.scope: Deactivated successfully. Dec 13 14:31:53.828000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:31:53.837649 kernel: audit: type=1334 audit(1734100313.828:1412): prog-id=193 op=UNLOAD Dec 13 14:31:53.885928 env[1234]: time="2024-12-13T14:31:53.885789654Z" level=info msg="shim disconnected" id=548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55 Dec 13 14:31:53.885928 env[1234]: time="2024-12-13T14:31:53.885879672Z" level=warning msg="cleaning up after shim disconnected" id=548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55 namespace=k8s.io Dec 13 14:31:53.885928 env[1234]: time="2024-12-13T14:31:53.885900043Z" level=info msg="cleaning up dead shim" Dec 13 14:31:53.889366 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55-rootfs.mount: Deactivated successfully. Dec 13 14:31:53.908166 env[1234]: time="2024-12-13T14:31:53.908099674Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4884 runtime=io.containerd.runc.v2\n" Dec 13 14:31:53.922000 audit[4872]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:53.940712 kernel: audit: type=1325 audit(1734100313.922:1413): table=filter:121 family=2 entries=8 op=nft_register_rule pid=4872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:53.922000 audit[4872]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff50c3dbe0 a2=0 a3=7fff50c3dbcc items=0 ppid=2350 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.978660 kernel: audit: type=1300 audit(1734100313.922:1413): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff50c3dbe0 a2=0 a3=7fff50c3dbcc items=0 ppid=2350 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.922000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:53.950000 audit[4872]: NETFILTER_CFG table=nat:122 family=2 entries=30 op=nft_register_rule pid=4872 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:54.007524 env[1234]: time="2024-12-13T14:31:54.007424335Z" level=info msg="StopContainer for \"548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55\" returns successfully" Dec 13 14:31:54.008935 env[1234]: time="2024-12-13T14:31:54.008891092Z" level=info msg="StopPodSandbox for \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\"" Dec 13 14:31:54.009342 env[1234]: time="2024-12-13T14:31:54.009288367Z" level=info msg="Container to stop \"548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:54.020850 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326-shm.mount: Deactivated successfully. Dec 13 14:31:53.950000 audit[4872]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff50c3dbe0 a2=0 a3=7fff50c3dbcc items=0 ppid=2350 pid=4872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:54.106000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:31:54.106990 systemd[1]: cri-containerd-d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326.scope: Deactivated successfully. Dec 13 14:31:54.110000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:31:54.160837 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326-rootfs.mount: Deactivated successfully. Dec 13 14:31:54.164850 env[1234]: time="2024-12-13T14:31:54.164770191Z" level=info msg="shim disconnected" id=d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326 Dec 13 14:31:54.166036 env[1234]: time="2024-12-13T14:31:54.165995528Z" level=warning msg="cleaning up after shim disconnected" id=d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326 namespace=k8s.io Dec 13 14:31:54.166266 env[1234]: time="2024-12-13T14:31:54.166239233Z" level=info msg="cleaning up dead shim" Dec 13 14:31:54.183027 env[1234]: time="2024-12-13T14:31:54.182967417Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4916 runtime=io.containerd.runc.v2\n" Dec 13 14:31:54.280167 systemd-networkd[1032]: cali7a08bd90bfd: Link DOWN Dec 13 14:31:54.280181 systemd-networkd[1032]: cali7a08bd90bfd: Lost carrier Dec 13 14:31:54.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.53:22-139.178.68.195:43788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.293969 systemd[1]: Started sshd@17-10.128.0.53:22-139.178.68.195:43788.service. Dec 13 14:31:54.334371 kubelet[2167]: I1213 14:31:54.334283 2167 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:31:54.406000 audit[4964]: NETFILTER_CFG table=filter:123 family=2 entries=46 op=nft_register_rule pid=4964 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:54.406000 audit[4964]: SYSCALL arch=c000003e syscall=46 success=yes exit=6824 a0=3 a1=7ffdabf06b30 a2=0 a3=7ffdabf06b1c items=0 ppid=3343 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.406000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:54.407000 audit[4964]: NETFILTER_CFG table=filter:124 family=2 entries=6 op=nft_unregister_chain pid=4964 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:54.407000 audit[4964]: SYSCALL arch=c000003e syscall=46 success=yes exit=848 a0=3 a1=7ffdabf06b30 a2=0 a3=5605caa52000 items=0 ppid=3343 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.407000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.278 [INFO][4943] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.278 [INFO][4943] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" iface="eth0" netns="/var/run/netns/cni-b4100393-796a-7c69-8a81-b7ee21ae1df1" Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.279 [INFO][4943] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" iface="eth0" netns="/var/run/netns/cni-b4100393-796a-7c69-8a81-b7ee21ae1df1" Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.310 [INFO][4943] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" after=32.051874ms iface="eth0" netns="/var/run/netns/cni-b4100393-796a-7c69-8a81-b7ee21ae1df1" Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.311 [INFO][4943] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.311 [INFO][4943] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.384 [INFO][4953] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.386 [INFO][4953] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.386 [INFO][4953] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.441 [INFO][4953] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.442 [INFO][4953] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.444 [INFO][4953] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:54.447760 env[1234]: 2024-12-13 14:31:54.445 [INFO][4943] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:31:54.460562 systemd[1]: run-netns-cni\x2db4100393\x2d796a\x2d7c69\x2d8a81\x2db7ee21ae1df1.mount: Deactivated successfully. Dec 13 14:31:54.466218 env[1234]: time="2024-12-13T14:31:54.464880165Z" level=info msg="TearDown network for sandbox \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\" successfully" Dec 13 14:31:54.466218 env[1234]: time="2024-12-13T14:31:54.464945157Z" level=info msg="StopPodSandbox for \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\" returns successfully" Dec 13 14:31:54.606000 audit[4950]: USER_ACCT pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:54.609251 sshd[4950]: Accepted publickey for core from 139.178.68.195 port 43788 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:54.609000 audit[4950]: CRED_ACQ pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:54.610000 audit[4950]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb5302ed0 a2=3 a3=0 items=0 ppid=1 pid=4950 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.610000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:54.611814 sshd[4950]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:54.620519 systemd-logind[1218]: New session 17 of user core. Dec 13 14:31:54.622966 systemd[1]: Started session-17.scope. Dec 13 14:31:54.631000 audit[4950]: USER_START pid=4950 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:54.635000 audit[4965]: CRED_ACQ pid=4965 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:54.666191 kubelet[2167]: I1213 14:31:54.666129 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-9njpd\" (UniqueName: \"kubernetes.io/projected/cc892c04-22e0-43e8-b63e-0f5712e255b9-kube-api-access-9njpd\") pod \"cc892c04-22e0-43e8-b63e-0f5712e255b9\" (UID: \"cc892c04-22e0-43e8-b63e-0f5712e255b9\") " Dec 13 14:31:54.666859 kubelet[2167]: I1213 14:31:54.666834 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cc892c04-22e0-43e8-b63e-0f5712e255b9-tigera-ca-bundle\") pod \"cc892c04-22e0-43e8-b63e-0f5712e255b9\" (UID: \"cc892c04-22e0-43e8-b63e-0f5712e255b9\") " Dec 13 14:31:54.678451 systemd[1]: var-lib-kubelet-pods-cc892c04\x2d22e0\x2d43e8\x2db63e\x2d0f5712e255b9-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. Dec 13 14:31:54.685788 kubelet[2167]: I1213 14:31:54.685716 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/cc892c04-22e0-43e8-b63e-0f5712e255b9-kube-api-access-9njpd" (OuterVolumeSpecName: "kube-api-access-9njpd") pod "cc892c04-22e0-43e8-b63e-0f5712e255b9" (UID: "cc892c04-22e0-43e8-b63e-0f5712e255b9"). InnerVolumeSpecName "kube-api-access-9njpd". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:31:54.687148 kubelet[2167]: I1213 14:31:54.687100 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/cc892c04-22e0-43e8-b63e-0f5712e255b9-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "cc892c04-22e0-43e8-b63e-0f5712e255b9" (UID: "cc892c04-22e0-43e8-b63e-0f5712e255b9"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:31:54.703864 systemd[1]: Removed slice kubepods-besteffort-podcc892c04_22e0_43e8_b63e_0f5712e255b9.slice. Dec 13 14:31:54.767802 kubelet[2167]: I1213 14:31:54.767744 2167 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-9njpd\" (UniqueName: \"kubernetes.io/projected/cc892c04-22e0-43e8-b63e-0f5712e255b9-kube-api-access-9njpd\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:31:54.768104 kubelet[2167]: I1213 14:31:54.767803 2167 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cc892c04-22e0-43e8-b63e-0f5712e255b9-tigera-ca-bundle\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:31:54.884192 systemd[1]: var-lib-kubelet-pods-cc892c04\x2d22e0\x2d43e8\x2db63e\x2d0f5712e255b9-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d9njpd.mount: Deactivated successfully. Dec 13 14:31:54.912465 sshd[4950]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:54.914000 audit[4950]: USER_END pid=4950 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:54.914000 audit[4950]: CRED_DISP pid=4950 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:54.917699 systemd[1]: sshd@17-10.128.0.53:22-139.178.68.195:43788.service: Deactivated successfully. Dec 13 14:31:54.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.53:22-139.178.68.195:43788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.919238 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:31:54.920309 systemd-logind[1218]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:31:54.921829 systemd-logind[1218]: Removed session 17. Dec 13 14:31:55.415369 kubelet[2167]: I1213 14:31:55.415315 2167 topology_manager.go:215] "Topology Admit Handler" podUID="82a0b658-9b77-4e39-b55e-6a62e78d9217" podNamespace="calico-system" podName="calico-kube-controllers-57b9c475db-76ckl" Dec 13 14:31:55.416154 kubelet[2167]: E1213 14:31:55.415430 2167 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cc892c04-22e0-43e8-b63e-0f5712e255b9" containerName="calico-kube-controllers" Dec 13 14:31:55.416154 kubelet[2167]: I1213 14:31:55.415486 2167 memory_manager.go:354] "RemoveStaleState removing state" podUID="cc892c04-22e0-43e8-b63e-0f5712e255b9" containerName="calico-kube-controllers" Dec 13 14:31:55.424106 systemd[1]: Created slice kubepods-besteffort-pod82a0b658_9b77_4e39_b55e_6a62e78d9217.slice. Dec 13 14:31:55.573264 kubelet[2167]: I1213 14:31:55.573197 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/82a0b658-9b77-4e39-b55e-6a62e78d9217-tigera-ca-bundle\") pod \"calico-kube-controllers-57b9c475db-76ckl\" (UID: \"82a0b658-9b77-4e39-b55e-6a62e78d9217\") " pod="calico-system/calico-kube-controllers-57b9c475db-76ckl" Dec 13 14:31:55.573570 kubelet[2167]: I1213 14:31:55.573503 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qcwqh\" (UniqueName: \"kubernetes.io/projected/82a0b658-9b77-4e39-b55e-6a62e78d9217-kube-api-access-qcwqh\") pod \"calico-kube-controllers-57b9c475db-76ckl\" (UID: \"82a0b658-9b77-4e39-b55e-6a62e78d9217\") " pod="calico-system/calico-kube-controllers-57b9c475db-76ckl" Dec 13 14:31:55.730932 env[1234]: time="2024-12-13T14:31:55.730865568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57b9c475db-76ckl,Uid:82a0b658-9b77-4e39-b55e-6a62e78d9217,Namespace:calico-system,Attempt:0,}" Dec 13 14:31:56.043211 systemd-networkd[1032]: cali75f1b5625e7: Link UP Dec 13 14:31:56.051653 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:56.062653 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali75f1b5625e7: link becomes ready Dec 13 14:31:56.066295 systemd-networkd[1032]: cali75f1b5625e7: Gained carrier Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:55.888 [INFO][4989] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0 calico-kube-controllers-57b9c475db- calico-system 82a0b658-9b77-4e39-b55e-6a62e78d9217 1197 0 2024-12-13 14:31:55 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:57b9c475db projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal calico-kube-controllers-57b9c475db-76ckl eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali75f1b5625e7 [] []}} ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Namespace="calico-system" Pod="calico-kube-controllers-57b9c475db-76ckl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:55.888 [INFO][4989] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Namespace="calico-system" Pod="calico-kube-controllers-57b9c475db-76ckl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:55.967 [INFO][5007] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" HandleID="k8s-pod-network.69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:55.984 [INFO][5007] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" HandleID="k8s-pod-network.69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312960), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", "pod":"calico-kube-controllers-57b9c475db-76ckl", "timestamp":"2024-12-13 14:31:55.967318268 +0000 UTC"}, Hostname:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:55.984 [INFO][5007] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:55.984 [INFO][5007] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:55.984 [INFO][5007] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal' Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:55.986 [INFO][5007] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:55.994 [INFO][5007] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:56.005 [INFO][5007] ipam/ipam.go 489: Trying affinity for 192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:56.008 [INFO][5007] ipam/ipam.go 155: Attempting to load block cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:56.012 [INFO][5007] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.38.192/26 host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:56.012 [INFO][5007] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.38.192/26 handle="k8s-pod-network.69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:56.014 [INFO][5007] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20 Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:56.021 [INFO][5007] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.38.192/26 handle="k8s-pod-network.69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:56.031 [INFO][5007] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.38.199/26] block=192.168.38.192/26 handle="k8s-pod-network.69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:56.031 [INFO][5007] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.38.199/26] handle="k8s-pod-network.69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" host="ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal" Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:56.031 [INFO][5007] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:56.096114 env[1234]: 2024-12-13 14:31:56.031 [INFO][5007] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.38.199/26] IPv6=[] ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" HandleID="k8s-pod-network.69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0" Dec 13 14:31:56.097599 env[1234]: 2024-12-13 14:31:56.033 [INFO][4989] cni-plugin/k8s.go 386: Populated endpoint ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Namespace="calico-system" Pod="calico-kube-controllers-57b9c475db-76ckl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0", GenerateName:"calico-kube-controllers-57b9c475db-", Namespace:"calico-system", SelfLink:"", UID:"82a0b658-9b77-4e39-b55e-6a62e78d9217", ResourceVersion:"1197", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57b9c475db", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-57b9c475db-76ckl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali75f1b5625e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:56.097599 env[1234]: 2024-12-13 14:31:56.034 [INFO][4989] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.38.199/32] ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Namespace="calico-system" Pod="calico-kube-controllers-57b9c475db-76ckl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0" Dec 13 14:31:56.097599 env[1234]: 2024-12-13 14:31:56.034 [INFO][4989] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali75f1b5625e7 ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Namespace="calico-system" Pod="calico-kube-controllers-57b9c475db-76ckl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0" Dec 13 14:31:56.097599 env[1234]: 2024-12-13 14:31:56.067 [INFO][4989] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Namespace="calico-system" Pod="calico-kube-controllers-57b9c475db-76ckl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0" Dec 13 14:31:56.097599 env[1234]: 2024-12-13 14:31:56.075 [INFO][4989] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Namespace="calico-system" Pod="calico-kube-controllers-57b9c475db-76ckl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0", GenerateName:"calico-kube-controllers-57b9c475db-", Namespace:"calico-system", SelfLink:"", UID:"82a0b658-9b77-4e39-b55e-6a62e78d9217", ResourceVersion:"1197", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57b9c475db", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal", ContainerID:"69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20", Pod:"calico-kube-controllers-57b9c475db-76ckl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.38.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali75f1b5625e7", MAC:"a2:20:0d:bf:5b:a6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:56.097599 env[1234]: 2024-12-13 14:31:56.092 [INFO][4989] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20" Namespace="calico-system" Pod="calico-kube-controllers-57b9c475db-76ckl" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--57b9c475db--76ckl-eth0" Dec 13 14:31:56.143090 env[1234]: time="2024-12-13T14:31:56.142761548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:56.143090 env[1234]: time="2024-12-13T14:31:56.142827846Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:56.143090 env[1234]: time="2024-12-13T14:31:56.142848319Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:56.143497 env[1234]: time="2024-12-13T14:31:56.143178121Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20 pid=5034 runtime=io.containerd.runc.v2 Dec 13 14:31:56.145000 audit[5027]: NETFILTER_CFG table=filter:125 family=2 entries=52 op=nft_register_chain pid=5027 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:56.145000 audit[5027]: SYSCALL arch=c000003e syscall=46 success=yes exit=25040 a0=3 a1=7ffe9e51af60 a2=0 a3=7ffe9e51af4c items=0 ppid=3343 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.145000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:56.192757 systemd[1]: run-containerd-runc-k8s.io-69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20-runc.MCAaqC.mount: Deactivated successfully. Dec 13 14:31:56.203296 systemd[1]: Started cri-containerd-69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20.scope. Dec 13 14:31:56.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit: BPF prog-id=208 op=LOAD Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5034 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623535313835316361306234326234333737393734346331396430 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5034 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623535313835316361306234326234333737393734346331396430 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit: BPF prog-id=209 op=LOAD Dec 13 14:31:56.221000 audit[5044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9f10 items=0 ppid=5034 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623535313835316361306234326234333737393734346331396430 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.221000 audit: BPF prog-id=210 op=LOAD Dec 13 14:31:56.221000 audit[5044]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9f58 items=0 ppid=5034 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623535313835316361306234326234333737393734346331396430 Dec 13 14:31:56.222000 audit: BPF prog-id=210 op=UNLOAD Dec 13 14:31:56.222000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:31:56.222000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.222000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.222000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.222000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.222000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.222000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.222000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.222000 audit[5044]: AVC avc: denied { perfmon } for pid=5044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.222000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.222000 audit[5044]: AVC avc: denied { bpf } for pid=5044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.222000 audit: BPF prog-id=211 op=LOAD Dec 13 14:31:56.222000 audit[5044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000342368 items=0 ppid=5034 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623535313835316361306234326234333737393734346331396430 Dec 13 14:31:56.275771 env[1234]: time="2024-12-13T14:31:56.275669046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57b9c475db-76ckl,Uid:82a0b658-9b77-4e39-b55e-6a62e78d9217,Namespace:calico-system,Attempt:0,} returns sandbox id \"69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20\"" Dec 13 14:31:56.311842 env[1234]: time="2024-12-13T14:31:56.304641151Z" level=info msg="CreateContainer within sandbox \"69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:31:56.305852 systemd[1]: run-containerd-runc-k8s.io-49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6-runc.nOpThO.mount: Deactivated successfully. Dec 13 14:31:56.322947 env[1234]: time="2024-12-13T14:31:56.322878581Z" level=info msg="CreateContainer within sandbox \"69b551851ca0b42b43779744c19d036d3d6326fe588a72245bb9efe9522d8d20\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"6ee65769cd6f4d7ca8419e6d3630d509f4641697b36c871fd625cd4f526242ed\"" Dec 13 14:31:56.326281 env[1234]: time="2024-12-13T14:31:56.326042266Z" level=info msg="StartContainer for \"6ee65769cd6f4d7ca8419e6d3630d509f4641697b36c871fd625cd4f526242ed\"" Dec 13 14:31:56.381172 systemd[1]: Started cri-containerd-6ee65769cd6f4d7ca8419e6d3630d509f4641697b36c871fd625cd4f526242ed.scope. Dec 13 14:31:56.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.436000 audit: BPF prog-id=212 op=LOAD Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5034 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653635373639636436663464376361383431396536643336333064 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5034 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653635373639636436663464376361383431396536643336333064 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit: BPF prog-id=213 op=LOAD Dec 13 14:31:56.437000 audit[5091]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8ea0 items=0 ppid=5034 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653635373639636436663464376361383431396536643336333064 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit: BPF prog-id=214 op=LOAD Dec 13 14:31:56.437000 audit[5091]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8ee8 items=0 ppid=5034 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653635373639636436663464376361383431396536643336333064 Dec 13 14:31:56.437000 audit: BPF prog-id=214 op=UNLOAD Dec 13 14:31:56.437000 audit: BPF prog-id=213 op=UNLOAD Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { perfmon } for pid=5091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit[5091]: AVC avc: denied { bpf } for pid=5091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.437000 audit: BPF prog-id=215 op=LOAD Dec 13 14:31:56.437000 audit[5091]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c92f8 items=0 ppid=5034 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653635373639636436663464376361383431396536643336333064 Dec 13 14:31:56.493123 env[1234]: time="2024-12-13T14:31:56.493025672Z" level=info msg="StartContainer for \"6ee65769cd6f4d7ca8419e6d3630d509f4641697b36c871fd625cd4f526242ed\" returns successfully" Dec 13 14:31:56.699754 kubelet[2167]: I1213 14:31:56.697654 2167 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="cc892c04-22e0-43e8-b63e-0f5712e255b9" path="/var/lib/kubelet/pods/cc892c04-22e0-43e8-b63e-0f5712e255b9/volumes" Dec 13 14:31:57.409637 systemd[1]: run-containerd-runc-k8s.io-6ee65769cd6f4d7ca8419e6d3630d509f4641697b36c871fd625cd4f526242ed-runc.Z3ZZxl.mount: Deactivated successfully. Dec 13 14:31:57.496197 kubelet[2167]: I1213 14:31:57.496140 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-57b9c475db-76ckl" podStartSLOduration=2.496030748 podStartE2EDuration="2.496030748s" podCreationTimestamp="2024-12-13 14:31:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:31:57.383505788 +0000 UTC m=+90.953277469" watchObservedRunningTime="2024-12-13 14:31:57.496030748 +0000 UTC m=+91.065802431" Dec 13 14:31:57.848882 systemd-networkd[1032]: cali75f1b5625e7: Gained IPv6LL Dec 13 14:31:58.511065 systemd[1]: cri-containerd-1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3.scope: Deactivated successfully. Dec 13 14:31:58.510000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:31:58.513000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:31:58.548869 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3-rootfs.mount: Deactivated successfully. Dec 13 14:31:58.552292 env[1234]: time="2024-12-13T14:31:58.552067810Z" level=info msg="shim disconnected" id=1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3 Dec 13 14:31:58.552292 env[1234]: time="2024-12-13T14:31:58.552147916Z" level=warning msg="cleaning up after shim disconnected" id=1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3 namespace=k8s.io Dec 13 14:31:58.552292 env[1234]: time="2024-12-13T14:31:58.552163807Z" level=info msg="cleaning up dead shim" Dec 13 14:31:58.570818 env[1234]: time="2024-12-13T14:31:58.570754348Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5200 runtime=io.containerd.runc.v2\n" Dec 13 14:31:58.589837 env[1234]: time="2024-12-13T14:31:58.589742778Z" level=info msg="StopContainer for \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\" returns successfully" Dec 13 14:31:58.590897 env[1234]: time="2024-12-13T14:31:58.590832641Z" level=info msg="StopPodSandbox for \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\"" Dec 13 14:31:58.591072 env[1234]: time="2024-12-13T14:31:58.590946714Z" level=info msg="Container to stop \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:58.598006 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5-shm.mount: Deactivated successfully. Dec 13 14:31:58.625242 kernel: kauditd_printk_skb: 142 callbacks suppressed Dec 13 14:31:58.625447 kernel: audit: type=1334 audit(1734100318.607:1467): prog-id=122 op=UNLOAD Dec 13 14:31:58.607000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:31:58.608252 systemd[1]: cri-containerd-597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5.scope: Deactivated successfully. Dec 13 14:31:58.625000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:31:58.635806 kernel: audit: type=1334 audit(1734100318.625:1468): prog-id=125 op=UNLOAD Dec 13 14:31:58.662972 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5-rootfs.mount: Deactivated successfully. Dec 13 14:31:58.666023 env[1234]: time="2024-12-13T14:31:58.665944593Z" level=info msg="shim disconnected" id=597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5 Dec 13 14:31:58.666229 env[1234]: time="2024-12-13T14:31:58.666030521Z" level=warning msg="cleaning up after shim disconnected" id=597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5 namespace=k8s.io Dec 13 14:31:58.666229 env[1234]: time="2024-12-13T14:31:58.666047037Z" level=info msg="cleaning up dead shim" Dec 13 14:31:58.679857 env[1234]: time="2024-12-13T14:31:58.679789091Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5232 runtime=io.containerd.runc.v2\n" Dec 13 14:31:58.688919 env[1234]: time="2024-12-13T14:31:58.688688553Z" level=info msg="TearDown network for sandbox \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\" successfully" Dec 13 14:31:58.688919 env[1234]: time="2024-12-13T14:31:58.688754040Z" level=info msg="StopPodSandbox for \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\" returns successfully" Dec 13 14:31:58.740000 audit[5247]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=5247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:58.758641 kernel: audit: type=1325 audit(1734100318.740:1469): table=filter:126 family=2 entries=9 op=nft_register_rule pid=5247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:58.758840 kernel: audit: type=1300 audit(1734100318.740:1469): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdeebafe50 a2=0 a3=7ffdeebafe3c items=0 ppid=2350 pid=5247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.740000 audit[5247]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdeebafe50 a2=0 a3=7ffdeebafe3c items=0 ppid=2350 pid=5247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:58.808724 kernel: audit: type=1327 audit(1734100318.740:1469): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:58.810069 kubelet[2167]: I1213 14:31:58.809460 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f28cffb7-bdba-40e0-82da-382340e478cf-tigera-ca-bundle\") pod \"f28cffb7-bdba-40e0-82da-382340e478cf\" (UID: \"f28cffb7-bdba-40e0-82da-382340e478cf\") " Dec 13 14:31:58.810955 kubelet[2167]: I1213 14:31:58.810901 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f28cffb7-bdba-40e0-82da-382340e478cf-typha-certs\") pod \"f28cffb7-bdba-40e0-82da-382340e478cf\" (UID: \"f28cffb7-bdba-40e0-82da-382340e478cf\") " Dec 13 14:31:58.811216 kubelet[2167]: I1213 14:31:58.811193 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-dzbrx\" (UniqueName: \"kubernetes.io/projected/f28cffb7-bdba-40e0-82da-382340e478cf-kube-api-access-dzbrx\") pod \"f28cffb7-bdba-40e0-82da-382340e478cf\" (UID: \"f28cffb7-bdba-40e0-82da-382340e478cf\") " Dec 13 14:31:58.824786 systemd[1]: var-lib-kubelet-pods-f28cffb7\x2dbdba\x2d40e0\x2d82da\x2d382340e478cf-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Dec 13 14:31:58.829568 kubelet[2167]: I1213 14:31:58.829521 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/f28cffb7-bdba-40e0-82da-382340e478cf-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "f28cffb7-bdba-40e0-82da-382340e478cf" (UID: "f28cffb7-bdba-40e0-82da-382340e478cf"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:31:58.837192 systemd[1]: var-lib-kubelet-pods-f28cffb7\x2dbdba\x2d40e0\x2d82da\x2d382340e478cf-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2ddzbrx.mount: Deactivated successfully. Dec 13 14:31:58.838905 kubelet[2167]: I1213 14:31:58.837310 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/f28cffb7-bdba-40e0-82da-382340e478cf-kube-api-access-dzbrx" (OuterVolumeSpecName: "kube-api-access-dzbrx") pod "f28cffb7-bdba-40e0-82da-382340e478cf" (UID: "f28cffb7-bdba-40e0-82da-382340e478cf"). InnerVolumeSpecName "kube-api-access-dzbrx". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:31:58.837359 systemd[1]: var-lib-kubelet-pods-f28cffb7\x2dbdba\x2d40e0\x2d82da\x2d382340e478cf-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Dec 13 14:31:58.843094 kubelet[2167]: I1213 14:31:58.843052 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/f28cffb7-bdba-40e0-82da-382340e478cf-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "f28cffb7-bdba-40e0-82da-382340e478cf" (UID: "f28cffb7-bdba-40e0-82da-382340e478cf"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:31:58.845000 audit[5247]: NETFILTER_CFG table=nat:127 family=2 entries=27 op=nft_unregister_chain pid=5247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:58.866100 kernel: audit: type=1325 audit(1734100318.845:1470): table=nat:127 family=2 entries=27 op=nft_unregister_chain pid=5247 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:58.866317 kernel: audit: type=1300 audit(1734100318.845:1470): arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffdeebafe50 a2=0 a3=7ffdeebafe3c items=0 ppid=2350 pid=5247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.845000 audit[5247]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffdeebafe50 a2=0 a3=7ffdeebafe3c items=0 ppid=2350 pid=5247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.919713 kernel: audit: type=1327 audit(1734100318.845:1470): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:58.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:58.920042 kubelet[2167]: I1213 14:31:58.918993 2167 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/f28cffb7-bdba-40e0-82da-382340e478cf-typha-certs\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:31:58.920042 kubelet[2167]: I1213 14:31:58.919042 2167 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-dzbrx\" (UniqueName: \"kubernetes.io/projected/f28cffb7-bdba-40e0-82da-382340e478cf-kube-api-access-dzbrx\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:31:58.920042 kubelet[2167]: I1213 14:31:58.919063 2167 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f28cffb7-bdba-40e0-82da-382340e478cf-tigera-ca-bundle\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:31:59.370350 kubelet[2167]: I1213 14:31:59.370048 2167 scope.go:117] "RemoveContainer" containerID="1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3" Dec 13 14:31:59.371221 systemd[1]: Removed slice kubepods-besteffort-podf28cffb7_bdba_40e0_82da_382340e478cf.slice. Dec 13 14:31:59.375240 env[1234]: time="2024-12-13T14:31:59.375181633Z" level=info msg="RemoveContainer for \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\"" Dec 13 14:31:59.382939 env[1234]: time="2024-12-13T14:31:59.382873288Z" level=info msg="RemoveContainer for \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\" returns successfully" Dec 13 14:31:59.384509 kubelet[2167]: I1213 14:31:59.383748 2167 scope.go:117] "RemoveContainer" containerID="1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3" Dec 13 14:31:59.385301 env[1234]: time="2024-12-13T14:31:59.384921291Z" level=error msg="ContainerStatus for \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\": not found" Dec 13 14:31:59.386088 kubelet[2167]: E1213 14:31:59.386059 2167 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\": not found" containerID="1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3" Dec 13 14:31:59.386377 kubelet[2167]: I1213 14:31:59.386342 2167 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3"} err="failed to get container status \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\": rpc error: code = NotFound desc = an error occurred when try to find container \"1411351a7a00c72b10323351cc2c5d962da8e672d41aeb46c91603227acc06a3\": not found" Dec 13 14:31:59.633000 audit[5274]: NETFILTER_CFG table=filter:128 family=2 entries=9 op=nft_register_rule pid=5274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:59.633000 audit[5274]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc8b478460 a2=0 a3=7ffc8b47844c items=0 ppid=2350 pid=5274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.685105 kernel: audit: type=1325 audit(1734100319.633:1471): table=filter:128 family=2 entries=9 op=nft_register_rule pid=5274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:59.685323 kernel: audit: type=1300 audit(1734100319.633:1471): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc8b478460 a2=0 a3=7ffc8b47844c items=0 ppid=2350 pid=5274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:59.689000 audit[5274]: NETFILTER_CFG table=nat:129 family=2 entries=27 op=nft_register_chain pid=5274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:59.689000 audit[5274]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc8b478460 a2=0 a3=7ffc8b47844c items=0 ppid=2350 pid=5274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit: BPF prog-id=216 op=LOAD Dec 13 14:31:59.775000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe02e931a0 a2=98 a3=3 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.775000 audit: BPF prog-id=216 op=UNLOAD Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit: BPF prog-id=217 op=LOAD Dec 13 14:31:59.775000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe02e92f80 a2=74 a3=540051 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.775000 audit: BPF prog-id=217 op=UNLOAD Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.775000 audit: BPF prog-id=218 op=LOAD Dec 13 14:31:59.775000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe02e92fb0 a2=94 a3=2 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.775000 audit: BPF prog-id=218 op=UNLOAD Dec 13 14:31:59.908000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.908000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.908000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.908000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.908000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.908000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.908000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.908000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.908000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.908000 audit: BPF prog-id=219 op=LOAD Dec 13 14:31:59.908000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe02e92e70 a2=40 a3=1 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.908000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.909000 audit: BPF prog-id=219 op=UNLOAD Dec 13 14:31:59.909000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.909000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe02e92f40 a2=50 a3=7ffe02e93020 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.909000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe02e92e80 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe02e92eb0 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe02e92dc0 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe02e92ed0 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe02e92eb0 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe02e92ea0 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe02e92ed0 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe02e92eb0 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe02e92ed0 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe02e92ea0 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe02e92f10 a2=28 a3=0 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe02e92cc0 a2=50 a3=1 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.923000 audit: BPF prog-id=220 op=LOAD Dec 13 14:31:59.923000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe02e92cc0 a2=94 a3=5 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.924000 audit: BPF prog-id=220 op=UNLOAD Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe02e92d70 a2=50 a3=1 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.924000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe02e92e90 a2=4 a3=38 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.924000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { confidentiality } for pid=5290 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:59.924000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe02e92ee0 a2=94 a3=6 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.924000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.924000 audit[5290]: AVC avc: denied { confidentiality } for pid=5290 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:59.924000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe02e92690 a2=94 a3=83 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.924000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { perfmon } for pid=5290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { bpf } for pid=5290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.925000 audit[5290]: AVC avc: denied { confidentiality } for pid=5290 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:59.925000 audit[5290]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe02e92690 a2=94 a3=83 items=0 ppid=5275 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.925000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:59.927000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.927000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.927000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.927000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.927000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.927000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.927000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.927000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.927000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.927000 audit: BPF prog-id=221 op=LOAD Dec 13 14:31:59.927000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3d4d1470 a2=98 a3=3 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.927000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:31:59.927000 audit: BPF prog-id=221 op=UNLOAD Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit: BPF prog-id=222 op=LOAD Dec 13 14:31:59.928000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe3d4d1250 a2=74 a3=540051 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.928000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:31:59.928000 audit: BPF prog-id=222 op=UNLOAD Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:59.928000 audit: BPF prog-id=223 op=LOAD Dec 13 14:31:59.928000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe3d4d1280 a2=94 a3=2 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.928000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:31:59.928000 audit: BPF prog-id=223 op=UNLOAD Dec 13 14:31:59.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.53:22-139.178.68.195:44828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:59.962680 systemd[1]: Started sshd@18-10.128.0.53:22-139.178.68.195:44828.service. Dec 13 14:32:00.151000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.151000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.151000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.151000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.151000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.151000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.151000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.151000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.151000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.151000 audit: BPF prog-id=224 op=LOAD Dec 13 14:32:00.151000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe3d4d1140 a2=40 a3=1 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.151000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.151000 audit: BPF prog-id=224 op=UNLOAD Dec 13 14:32:00.151000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.151000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe3d4d1210 a2=50 a3=7ffe3d4d12f0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.151000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3d4d1150 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3d4d1180 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3d4d1090 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3d4d11a0 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3d4d1180 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3d4d1170 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3d4d11a0 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3d4d1180 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3d4d11a0 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3d4d1170 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe3d4d11e0 a2=28 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.168000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.168000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe3d4d0f90 a2=50 a3=1 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.168000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit: BPF prog-id=225 op=LOAD Dec 13 14:32:00.169000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe3d4d0f90 a2=94 a3=5 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.169000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.169000 audit: BPF prog-id=225 op=UNLOAD Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe3d4d1040 a2=50 a3=1 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.169000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe3d4d1160 a2=4 a3=38 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.169000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { confidentiality } for pid=5291 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:00.169000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe3d4d11b0 a2=94 a3=6 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.169000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { confidentiality } for pid=5291 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:00.169000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe3d4d0960 a2=94 a3=83 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.169000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: AVC avc: denied { perfmon } for pid=5291 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.169000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe3d4d0960 a2=94 a3=83 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.169000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.181000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.181000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.181000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.181000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=3d items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.181000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.181000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=42 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.181000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.181000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=45 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.181000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.181000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=49 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.181000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.181000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=4d items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.181000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=51 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=52 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=53 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=54 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=55 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=56 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=57 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=58 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=59 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=5a items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=5b items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=5c items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=5d items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.182000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.182000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=5e items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=5f items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=60 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=61 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=62 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=63 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=64 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=65 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=66 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=67 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=6a items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=6b items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=6e items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=71 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=72 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=75 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.183000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.183000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=76 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.183000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=79 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=8a items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=a2 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=a5 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=a6 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=a9 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=aa items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=ad items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=ae items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=b1 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=b2 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=b5 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=b6 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.184000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.184000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=b9 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.184000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=ba items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=bd items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=c2 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=c5 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=c8 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=c9 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=cc items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=cf items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=d0 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=d3 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.185000 audit[5291]: AVC avc: denied { bpf } for pid=5291 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.185000 audit[5291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe3d4d23a0 a2=10 a3=d4 items=0 ppid=5275 pid=5291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.185000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:32:00.203000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.203000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.203000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.203000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.203000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.203000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.203000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.203000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.203000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.203000 audit: BPF prog-id=226 op=LOAD Dec 13 14:32:00.203000 audit[5309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2e2a7100 a2=98 a3=1999999999999999 items=0 ppid=5275 pid=5309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.203000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:00.204000 audit: BPF prog-id=226 op=UNLOAD Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit: BPF prog-id=227 op=LOAD Dec 13 14:32:00.204000 audit[5309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2e2a6fe0 a2=74 a3=ffff items=0 ppid=5275 pid=5309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.204000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:00.204000 audit: BPF prog-id=227 op=UNLOAD Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { perfmon } for pid=5309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit[5309]: AVC avc: denied { bpf } for pid=5309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.204000 audit: BPF prog-id=228 op=LOAD Dec 13 14:32:00.204000 audit[5309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2e2a7020 a2=40 a3=7ffe2e2a7200 items=0 ppid=5275 pid=5309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.204000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:00.204000 audit: BPF prog-id=228 op=UNLOAD Dec 13 14:32:00.271000 audit[5293]: USER_ACCT pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:00.273900 sshd[5293]: Accepted publickey for core from 139.178.68.195 port 44828 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:32:00.273000 audit[5293]: CRED_ACQ pid=5293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:00.273000 audit[5293]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc076e43f0 a2=3 a3=0 items=0 ppid=1 pid=5293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:00.275137 sshd[5293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:00.284874 systemd[1]: Started session-18.scope. Dec 13 14:32:00.286129 systemd-logind[1218]: New session 18 of user core. Dec 13 14:32:00.297000 audit[5293]: USER_START pid=5293 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:00.301000 audit[5325]: CRED_ACQ pid=5325 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:00.588769 sshd[5293]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:00.590000 audit[5293]: USER_END pid=5293 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:00.590000 audit[5293]: CRED_DISP pid=5293 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:00.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.53:22-139.178.68.195:44828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.594326 systemd-logind[1218]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:32:00.594905 systemd[1]: sshd@18-10.128.0.53:22-139.178.68.195:44828.service: Deactivated successfully. Dec 13 14:32:00.596387 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:32:00.598508 systemd-logind[1218]: Removed session 18. Dec 13 14:32:00.698959 kubelet[2167]: I1213 14:32:00.698366 2167 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="f28cffb7-bdba-40e0-82da-382340e478cf" path="/var/lib/kubelet/pods/f28cffb7-bdba-40e0-82da-382340e478cf/volumes" Dec 13 14:32:05.666508 kernel: kauditd_printk_skb: 541 callbacks suppressed Dec 13 14:32:05.666774 kernel: audit: type=1130 audit(1734100325.635:1605): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.53:22-139.178.68.195:44836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:05.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.53:22-139.178.68.195:44836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:05.635986 systemd[1]: Started sshd@19-10.128.0.53:22-139.178.68.195:44836.service. Dec 13 14:32:05.932000 audit[5415]: USER_ACCT pid=5415 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:05.933283 sshd[5415]: Accepted publickey for core from 139.178.68.195 port 44836 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:32:05.962665 kernel: audit: type=1101 audit(1734100325.932:1606): pid=5415 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:05.964111 sshd[5415]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:05.962000 audit[5415]: CRED_ACQ pid=5415 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:05.996830 kernel: audit: type=1103 audit(1734100325.962:1607): pid=5415 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:05.996058 systemd-logind[1218]: New session 19 of user core. Dec 13 14:32:05.999738 systemd[1]: Started session-19.scope. Dec 13 14:32:06.015647 kernel: audit: type=1006 audit(1734100325.962:1608): pid=5415 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 14:32:05.962000 audit[5415]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd34ba5960 a2=3 a3=0 items=0 ppid=1 pid=5415 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:06.045755 kernel: audit: type=1300 audit(1734100325.962:1608): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd34ba5960 a2=3 a3=0 items=0 ppid=1 pid=5415 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:05.962000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:06.047000 audit[5415]: USER_START pid=5415 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.091374 kernel: audit: type=1327 audit(1734100325.962:1608): proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:06.091629 kernel: audit: type=1105 audit(1734100326.047:1609): pid=5415 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.058000 audit[5423]: CRED_ACQ pid=5423 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.116776 kernel: audit: type=1103 audit(1734100326.058:1610): pid=5423 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.394988 sshd[5415]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:06.397000 audit[5415]: USER_END pid=5415 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.407858 systemd[1]: sshd@19-10.128.0.53:22-139.178.68.195:44836.service: Deactivated successfully. Dec 13 14:32:06.409378 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:32:06.411412 systemd-logind[1218]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:32:06.413305 systemd-logind[1218]: Removed session 19. Dec 13 14:32:06.398000 audit[5415]: CRED_DISP pid=5415 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.455591 kernel: audit: type=1106 audit(1734100326.397:1611): pid=5415 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.455738 kernel: audit: type=1104 audit(1734100326.398:1612): pid=5415 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.53:22-139.178.68.195:44836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:06.465214 systemd[1]: Started sshd@20-10.128.0.53:22-139.178.68.195:37888.service. Dec 13 14:32:06.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.53:22-139.178.68.195:37888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:06.756000 audit[5446]: USER_ACCT pid=5446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.757217 sshd[5446]: Accepted publickey for core from 139.178.68.195 port 37888 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:32:06.758000 audit[5446]: CRED_ACQ pid=5446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.758000 audit[5446]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffead6fcc20 a2=3 a3=0 items=0 ppid=1 pid=5446 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:06.758000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:06.760145 sshd[5446]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:06.767372 systemd-logind[1218]: New session 20 of user core. Dec 13 14:32:06.768353 systemd[1]: Started session-20.scope. Dec 13 14:32:06.777000 audit[5446]: USER_START pid=5446 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:06.780000 audit[5448]: CRED_ACQ pid=5448 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:07.152184 sshd[5446]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:07.155000 audit[5446]: USER_END pid=5446 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:07.155000 audit[5446]: CRED_DISP pid=5446 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:07.159463 systemd[1]: sshd@20-10.128.0.53:22-139.178.68.195:37888.service: Deactivated successfully. Dec 13 14:32:07.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.53:22-139.178.68.195:37888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.161131 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:32:07.162200 systemd-logind[1218]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:32:07.163891 systemd-logind[1218]: Removed session 20. Dec 13 14:32:07.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.53:22-139.178.68.195:37890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:07.200391 systemd[1]: Started sshd@21-10.128.0.53:22-139.178.68.195:37890.service. Dec 13 14:32:07.492000 audit[5456]: USER_ACCT pid=5456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:07.493353 sshd[5456]: Accepted publickey for core from 139.178.68.195 port 37890 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:32:07.495536 sshd[5456]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:07.494000 audit[5456]: CRED_ACQ pid=5456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:07.494000 audit[5456]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeda9b2560 a2=3 a3=0 items=0 ppid=1 pid=5456 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:07.494000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:07.503723 systemd-logind[1218]: New session 21 of user core. Dec 13 14:32:07.504170 systemd[1]: Started session-21.scope. Dec 13 14:32:07.513000 audit[5456]: USER_START pid=5456 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:07.517000 audit[5465]: CRED_ACQ pid=5465 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:10.099000 audit[5510]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=5510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.099000 audit[5510]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff32420140 a2=0 a3=7fff3242012c items=0 ppid=2350 pid=5510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.104000 audit[5510]: NETFILTER_CFG table=nat:131 family=2 entries=22 op=nft_register_rule pid=5510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.104000 audit[5510]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff32420140 a2=0 a3=0 items=0 ppid=2350 pid=5510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.137000 audit[5512]: NETFILTER_CFG table=filter:132 family=2 entries=32 op=nft_register_rule pid=5512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.137000 audit[5512]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffddcd01a30 a2=0 a3=7ffddcd01a1c items=0 ppid=2350 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.143000 audit[5512]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.144526 sshd[5456]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:10.146000 audit[5456]: USER_END pid=5456 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:10.146000 audit[5456]: CRED_DISP pid=5456 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:10.143000 audit[5512]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffddcd01a30 a2=0 a3=0 items=0 ppid=2350 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.151869 systemd-logind[1218]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:32:10.156343 systemd[1]: sshd@21-10.128.0.53:22-139.178.68.195:37890.service: Deactivated successfully. Dec 13 14:32:10.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.53:22-139.178.68.195:37890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.158503 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:32:10.161731 systemd-logind[1218]: Removed session 21. Dec 13 14:32:10.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.53:22-139.178.68.195:37892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.199698 systemd[1]: Started sshd@22-10.128.0.53:22-139.178.68.195:37892.service. Dec 13 14:32:10.483000 audit[5515]: USER_ACCT pid=5515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:10.484080 sshd[5515]: Accepted publickey for core from 139.178.68.195 port 37892 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:32:10.487821 sshd[5515]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:10.486000 audit[5515]: CRED_ACQ pid=5515 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:10.486000 audit[5515]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd59ee9a60 a2=3 a3=0 items=0 ppid=1 pid=5515 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.486000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:10.496906 systemd-logind[1218]: New session 22 of user core. Dec 13 14:32:10.498157 systemd[1]: Started session-22.scope. Dec 13 14:32:10.507000 audit[5515]: USER_START pid=5515 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:10.510000 audit[5530]: CRED_ACQ pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.008631 sshd[5515]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:11.021041 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 14:32:11.021203 kernel: audit: type=1106 audit(1734100331.010:1642): pid=5515 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.010000 audit[5515]: USER_END pid=5515 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.015571 systemd[1]: sshd@22-10.128.0.53:22-139.178.68.195:37892.service: Deactivated successfully. Dec 13 14:32:11.017146 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:32:11.022980 systemd-logind[1218]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:32:11.025005 systemd-logind[1218]: Removed session 22. Dec 13 14:32:11.076015 kernel: audit: type=1104 audit(1734100331.010:1643): pid=5515 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.010000 audit[5515]: CRED_DISP pid=5515 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.53:22-139.178.68.195:37892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.083377 systemd[1]: Started sshd@23-10.128.0.53:22-139.178.68.195:37898.service. Dec 13 14:32:11.103813 kernel: audit: type=1131 audit(1734100331.010:1644): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.53:22-139.178.68.195:37892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.53:22-139.178.68.195:37898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.128696 kernel: audit: type=1130 audit(1734100331.082:1645): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.53:22-139.178.68.195:37898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.373000 audit[5544]: USER_ACCT pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.376027 sshd[5544]: Accepted publickey for core from 139.178.68.195 port 37898 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:32:11.405647 kernel: audit: type=1101 audit(1734100331.373:1646): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.404000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.408341 sshd[5544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:11.424943 systemd[1]: Started session-23.scope. Dec 13 14:32:11.428098 systemd-logind[1218]: New session 23 of user core. Dec 13 14:32:11.433656 kernel: audit: type=1103 audit(1734100331.404:1647): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.404000 audit[5544]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc9a70430 a2=3 a3=0 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:11.479253 kernel: audit: type=1006 audit(1734100331.404:1648): pid=5544 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:32:11.479463 kernel: audit: type=1300 audit(1734100331.404:1648): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc9a70430 a2=3 a3=0 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:11.404000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:11.439000 audit[5544]: USER_START pid=5544 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.521987 kernel: audit: type=1327 audit(1734100331.404:1648): proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:11.522259 kernel: audit: type=1105 audit(1734100331.439:1649): pid=5544 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.443000 audit[5546]: CRED_ACQ pid=5546 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.741794 sshd[5544]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:11.745000 audit[5544]: USER_END pid=5544 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.746000 audit[5544]: CRED_DISP pid=5544 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:11.751427 systemd-logind[1218]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:32:11.751872 systemd[1]: sshd@23-10.128.0.53:22-139.178.68.195:37898.service: Deactivated successfully. Dec 13 14:32:11.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.53:22-139.178.68.195:37898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:11.753407 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:32:11.755005 systemd-logind[1218]: Removed session 23. Dec 13 14:32:16.694680 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:32:16.694907 kernel: audit: type=1325 audit(1734100336.681:1654): table=filter:134 family=2 entries=20 op=nft_register_rule pid=5647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:16.681000 audit[5647]: NETFILTER_CFG table=filter:134 family=2 entries=20 op=nft_register_rule pid=5647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:16.681000 audit[5647]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe56f16480 a2=0 a3=7ffe56f1646c items=0 ppid=2350 pid=5647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:16.741754 kernel: audit: type=1300 audit(1734100336.681:1654): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe56f16480 a2=0 a3=7ffe56f1646c items=0 ppid=2350 pid=5647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.741842 kernel: audit: type=1327 audit(1734100336.681:1654): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:16.746000 audit[5647]: NETFILTER_CFG table=nat:135 family=2 entries=106 op=nft_register_chain pid=5647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:16.772798 kernel: audit: type=1325 audit(1734100336.746:1655): table=nat:135 family=2 entries=106 op=nft_register_chain pid=5647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:16.746000 audit[5647]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe56f16480 a2=0 a3=7ffe56f1646c items=0 ppid=2350 pid=5647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.806573 kernel: audit: type=1300 audit(1734100336.746:1655): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe56f16480 a2=0 a3=7ffe56f1646c items=0 ppid=2350 pid=5647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:16.823008 kernel: audit: type=1327 audit(1734100336.746:1655): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:16.830026 systemd[1]: Started sshd@24-10.128.0.53:22-139.178.68.195:57800.service. Dec 13 14:32:16.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.53:22-139.178.68.195:57800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.856715 kernel: audit: type=1130 audit(1734100336.829:1656): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.53:22-139.178.68.195:57800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.123000 audit[5650]: USER_ACCT pid=5650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:17.155056 sshd[5650]: Accepted publickey for core from 139.178.68.195 port 57800 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:32:17.155774 kernel: audit: type=1101 audit(1734100337.123:1657): pid=5650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:17.155959 sshd[5650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:17.153000 audit[5650]: CRED_ACQ pid=5650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:17.178484 systemd[1]: Started session-24.scope. Dec 13 14:32:17.180639 systemd-logind[1218]: New session 24 of user core. Dec 13 14:32:17.182920 kernel: audit: type=1103 audit(1734100337.153:1658): pid=5650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:17.153000 audit[5650]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff26743310 a2=3 a3=0 items=0 ppid=1 pid=5650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:17.202853 kernel: audit: type=1006 audit(1734100337.153:1659): pid=5650 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:32:17.153000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:17.189000 audit[5650]: USER_START pid=5650 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:17.194000 audit[5658]: CRED_ACQ pid=5658 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:17.459235 sshd[5650]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:17.460000 audit[5650]: USER_END pid=5650 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:17.461000 audit[5650]: CRED_DISP pid=5650 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:17.466397 systemd-logind[1218]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:32:17.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.53:22-139.178.68.195:57800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:17.469298 systemd[1]: sshd@24-10.128.0.53:22-139.178.68.195:57800.service: Deactivated successfully. Dec 13 14:32:17.470783 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:32:17.473987 systemd-logind[1218]: Removed session 24. Dec 13 14:32:22.506446 systemd[1]: Started sshd@25-10.128.0.53:22-139.178.68.195:57816.service. Dec 13 14:32:22.538003 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:32:22.538225 kernel: audit: type=1130 audit(1734100342.505:1665): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.53:22-139.178.68.195:57816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:22.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.53:22-139.178.68.195:57816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:22.546000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:22.575687 kernel: audit: type=1400 audit(1734100342.546:1666): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8249 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:22.546000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c013d80b70 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:32:22.546000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:32:22.641589 kernel: audit: type=1300 audit(1734100342.546:1666): arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c013d80b70 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:32:22.641895 kernel: audit: type=1327 audit(1734100342.546:1666): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:32:22.641944 kernel: audit: type=1400 audit(1734100342.547:1667): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:22.547000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:22.547000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c013d04720 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:32:22.701926 kernel: audit: type=1300 audit(1734100342.547:1667): arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c013d04720 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:32:22.547000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:32:22.573000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:22.759409 kernel: audit: type=1327 audit(1734100342.547:1667): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:32:22.761190 kernel: audit: type=1400 audit(1734100342.573:1668): avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:22.761396 kernel: audit: type=1300 audit(1734100342.573:1668): arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c013d80bd0 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:32:22.573000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c013d80bd0 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:32:22.573000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:32:22.821700 kernel: audit: type=1327 audit(1734100342.573:1668): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:32:22.797000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:22.797000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c010c42980 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:32:22.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:32:22.805000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:22.805000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c010c0e8a0 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:32:22.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:32:22.805000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:22.805000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c013d817a0 a2=fc6 a3=0 items=0 ppid=1870 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c311,c629 key=(null) Dec 13 14:32:22.805000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3533002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 14:32:22.826511 sshd[5761]: Accepted publickey for core from 139.178.68.195 port 57816 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:32:22.824000 audit[5761]: USER_ACCT pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:22.829528 sshd[5761]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:22.827000 audit[5761]: CRED_ACQ pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:22.827000 audit[5761]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde27212f0 a2=3 a3=0 items=0 ppid=1 pid=5761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:22.827000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:22.842631 systemd[1]: Started session-25.scope. Dec 13 14:32:22.844237 systemd-logind[1218]: New session 25 of user core. Dec 13 14:32:22.859000 audit[5761]: USER_START pid=5761 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:22.865000 audit[5769]: CRED_ACQ pid=5769 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:23.124596 sshd[5761]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:23.126000 audit[5761]: USER_END pid=5761 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:23.126000 audit[5761]: CRED_DISP pid=5761 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:23.130807 systemd[1]: sshd@25-10.128.0.53:22-139.178.68.195:57816.service: Deactivated successfully. Dec 13 14:32:23.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.53:22-139.178.68.195:57816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.132282 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:32:23.133356 systemd-logind[1218]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:32:23.134772 systemd-logind[1218]: Removed session 25. Dec 13 14:32:23.871000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:23.871000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:23.871000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e904e0 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:32:23.871000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:23.871000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000698c30 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:32:23.871000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:25.768076 systemd[1]: run-containerd-runc-k8s.io-6ee65769cd6f4d7ca8419e6d3630d509f4641697b36c871fd625cd4f526242ed-runc.L8D3Rr.mount: Deactivated successfully. Dec 13 14:32:26.286735 systemd[1]: run-containerd-runc-k8s.io-49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6-runc.zyJzYE.mount: Deactivated successfully. Dec 13 14:32:26.584329 env[1234]: time="2024-12-13T14:32:26.584160546Z" level=info msg="StopContainer for \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\" with timeout 5 (s)" Dec 13 14:32:26.586454 env[1234]: time="2024-12-13T14:32:26.586408798Z" level=info msg="Stop container \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\" with signal terminated" Dec 13 14:32:26.615550 systemd[1]: cri-containerd-49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6.scope: Deactivated successfully. Dec 13 14:32:26.616036 systemd[1]: cri-containerd-49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6.scope: Consumed 10.758s CPU time. Dec 13 14:32:26.652875 env[1234]: time="2024-12-13T14:32:26.652787693Z" level=info msg="shim disconnected" id=49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6 Dec 13 14:32:26.652875 env[1234]: time="2024-12-13T14:32:26.652867043Z" level=warning msg="cleaning up after shim disconnected" id=49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6 namespace=k8s.io Dec 13 14:32:26.652875 env[1234]: time="2024-12-13T14:32:26.652883548Z" level=info msg="cleaning up dead shim" Dec 13 14:32:26.668057 env[1234]: time="2024-12-13T14:32:26.667971401Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:32:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5922 runtime=io.containerd.runc.v2\n" Dec 13 14:32:26.694676 env[1234]: time="2024-12-13T14:32:26.693264661Z" level=info msg="StopContainer for \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\" returns successfully" Dec 13 14:32:26.695530 env[1234]: time="2024-12-13T14:32:26.695102319Z" level=info msg="StopPodSandbox for \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\"" Dec 13 14:32:26.695530 env[1234]: time="2024-12-13T14:32:26.695227947Z" level=info msg="Container to stop \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:32:26.695530 env[1234]: time="2024-12-13T14:32:26.695287813Z" level=info msg="Container to stop \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:32:26.695530 env[1234]: time="2024-12-13T14:32:26.695309989Z" level=info msg="Container to stop \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:32:26.713000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:32:26.713741 systemd[1]: cri-containerd-ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267.scope: Deactivated successfully. Dec 13 14:32:26.717000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:32:26.746540 env[1234]: time="2024-12-13T14:32:26.746466065Z" level=info msg="shim disconnected" id=ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267 Dec 13 14:32:26.746945 env[1234]: time="2024-12-13T14:32:26.746890849Z" level=warning msg="cleaning up after shim disconnected" id=ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267 namespace=k8s.io Dec 13 14:32:26.746945 env[1234]: time="2024-12-13T14:32:26.746920816Z" level=info msg="cleaning up dead shim" Dec 13 14:32:26.755846 systemd[1]: run-containerd-runc-k8s.io-49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6-runc.fOCzrP.mount: Deactivated successfully. Dec 13 14:32:26.756014 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6-rootfs.mount: Deactivated successfully. Dec 13 14:32:26.756126 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267-rootfs.mount: Deactivated successfully. Dec 13 14:32:26.756222 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267-shm.mount: Deactivated successfully. Dec 13 14:32:26.769369 env[1234]: time="2024-12-13T14:32:26.769293842Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:32:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5958 runtime=io.containerd.runc.v2\n" Dec 13 14:32:26.774649 env[1234]: time="2024-12-13T14:32:26.774575965Z" level=info msg="TearDown network for sandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" successfully" Dec 13 14:32:26.774934 env[1234]: time="2024-12-13T14:32:26.774892761Z" level=info msg="StopPodSandbox for \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" returns successfully" Dec 13 14:32:26.830687 kubelet[2167]: I1213 14:32:26.830635 2167 topology_manager.go:215] "Topology Admit Handler" podUID="04d6aa9d-16b9-4b76-825e-a684c1e96839" podNamespace="calico-system" podName="calico-node-h8psd" Dec 13 14:32:26.831419 kubelet[2167]: E1213 14:32:26.830751 2167 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="f28cffb7-bdba-40e0-82da-382340e478cf" containerName="calico-typha" Dec 13 14:32:26.831419 kubelet[2167]: E1213 14:32:26.830770 2167 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="f6db9f42-be49-437a-bc3d-19334cdb7400" containerName="flexvol-driver" Dec 13 14:32:26.831419 kubelet[2167]: E1213 14:32:26.830783 2167 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="f6db9f42-be49-437a-bc3d-19334cdb7400" containerName="install-cni" Dec 13 14:32:26.831419 kubelet[2167]: E1213 14:32:26.830803 2167 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="f6db9f42-be49-437a-bc3d-19334cdb7400" containerName="calico-node" Dec 13 14:32:26.831419 kubelet[2167]: I1213 14:32:26.830883 2167 memory_manager.go:354] "RemoveStaleState removing state" podUID="f6db9f42-be49-437a-bc3d-19334cdb7400" containerName="calico-node" Dec 13 14:32:26.831419 kubelet[2167]: I1213 14:32:26.830897 2167 memory_manager.go:354] "RemoveStaleState removing state" podUID="f28cffb7-bdba-40e0-82da-382340e478cf" containerName="calico-typha" Dec 13 14:32:26.839558 systemd[1]: Created slice kubepods-besteffort-pod04d6aa9d_16b9_4b76_825e_a684c1e96839.slice. Dec 13 14:32:26.889184 kubelet[2167]: I1213 14:32:26.889132 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-flexvol-driver-host\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.889576 kubelet[2167]: I1213 14:32:26.889258 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:32:26.889735 kubelet[2167]: I1213 14:32:26.889553 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-bin-dir\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.889735 kubelet[2167]: I1213 14:32:26.889670 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-xtables-lock\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.889878 kubelet[2167]: I1213 14:32:26.889741 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-net-dir\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.889878 kubelet[2167]: I1213 14:32:26.889813 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:32:26.890048 kubelet[2167]: I1213 14:32:26.889885 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f6db9f42-be49-437a-bc3d-19334cdb7400-tigera-ca-bundle\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.890141 kubelet[2167]: I1213 14:32:26.890078 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-policysync\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.890141 kubelet[2167]: I1213 14:32:26.890135 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-log-dir\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.890263 kubelet[2167]: I1213 14:32:26.890167 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-lib-modules\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.890263 kubelet[2167]: I1213 14:32:26.890235 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-8xz6x\" (UniqueName: \"kubernetes.io/projected/f6db9f42-be49-437a-bc3d-19334cdb7400-kube-api-access-8xz6x\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.890381 kubelet[2167]: I1213 14:32:26.890305 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f6db9f42-be49-437a-bc3d-19334cdb7400-node-certs\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.890381 kubelet[2167]: I1213 14:32:26.890348 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-var-run-calico\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.890521 kubelet[2167]: I1213 14:32:26.890412 2167 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-var-lib-calico\") pod \"f6db9f42-be49-437a-bc3d-19334cdb7400\" (UID: \"f6db9f42-be49-437a-bc3d-19334cdb7400\") " Dec 13 14:32:26.890591 kubelet[2167]: I1213 14:32:26.890564 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/04d6aa9d-16b9-4b76-825e-a684c1e96839-flexvol-driver-host\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.890678 kubelet[2167]: I1213 14:32:26.890634 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/04d6aa9d-16b9-4b76-825e-a684c1e96839-cni-net-dir\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.890742 kubelet[2167]: I1213 14:32:26.890678 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/04d6aa9d-16b9-4b76-825e-a684c1e96839-lib-modules\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.890821 kubelet[2167]: I1213 14:32:26.890743 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/04d6aa9d-16b9-4b76-825e-a684c1e96839-node-certs\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.890821 kubelet[2167]: I1213 14:32:26.890803 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/04d6aa9d-16b9-4b76-825e-a684c1e96839-var-lib-calico\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.890946 kubelet[2167]: I1213 14:32:26.890841 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/04d6aa9d-16b9-4b76-825e-a684c1e96839-cni-log-dir\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.890946 kubelet[2167]: I1213 14:32:26.890903 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/04d6aa9d-16b9-4b76-825e-a684c1e96839-tigera-ca-bundle\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.891068 kubelet[2167]: I1213 14:32:26.890971 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/04d6aa9d-16b9-4b76-825e-a684c1e96839-cni-bin-dir\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.891068 kubelet[2167]: I1213 14:32:26.891015 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/04d6aa9d-16b9-4b76-825e-a684c1e96839-xtables-lock\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.891191 kubelet[2167]: I1213 14:32:26.891080 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/04d6aa9d-16b9-4b76-825e-a684c1e96839-policysync\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.891191 kubelet[2167]: I1213 14:32:26.891160 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/04d6aa9d-16b9-4b76-825e-a684c1e96839-var-run-calico\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.891313 kubelet[2167]: I1213 14:32:26.891220 2167 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7m6pk\" (UniqueName: \"kubernetes.io/projected/04d6aa9d-16b9-4b76-825e-a684c1e96839-kube-api-access-7m6pk\") pod \"calico-node-h8psd\" (UID: \"04d6aa9d-16b9-4b76-825e-a684c1e96839\") " pod="calico-system/calico-node-h8psd" Dec 13 14:32:26.891313 kubelet[2167]: I1213 14:32:26.891260 2167 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-flexvol-driver-host\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.891313 kubelet[2167]: I1213 14:32:26.891303 2167 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-xtables-lock\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.891505 kubelet[2167]: I1213 14:32:26.891412 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-policysync" (OuterVolumeSpecName: "policysync") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:32:26.891505 kubelet[2167]: I1213 14:32:26.891470 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:32:26.891656 kubelet[2167]: I1213 14:32:26.891504 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:32:26.891879 kubelet[2167]: I1213 14:32:26.890027 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:32:26.891999 kubelet[2167]: I1213 14:32:26.889925 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:32:26.892773 kubelet[2167]: I1213 14:32:26.892735 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:32:26.893004 kubelet[2167]: I1213 14:32:26.892975 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:32:26.906081 systemd[1]: var-lib-kubelet-pods-f6db9f42\x2dbe49\x2d437a\x2dbc3d\x2d19334cdb7400-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 14:32:26.913505 kubelet[2167]: I1213 14:32:26.910331 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/f6db9f42-be49-437a-bc3d-19334cdb7400-node-certs" (OuterVolumeSpecName: "node-certs") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:32:26.913505 kubelet[2167]: I1213 14:32:26.910545 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/f6db9f42-be49-437a-bc3d-19334cdb7400-kube-api-access-8xz6x" (OuterVolumeSpecName: "kube-api-access-8xz6x") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "kube-api-access-8xz6x". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:32:26.906303 systemd[1]: var-lib-kubelet-pods-f6db9f42\x2dbe49\x2d437a\x2dbc3d\x2d19334cdb7400-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 14:32:26.912159 systemd[1]: var-lib-kubelet-pods-f6db9f42\x2dbe49\x2d437a\x2dbc3d\x2d19334cdb7400-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d8xz6x.mount: Deactivated successfully. Dec 13 14:32:26.915257 kubelet[2167]: I1213 14:32:26.915206 2167 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/f6db9f42-be49-437a-bc3d-19334cdb7400-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "f6db9f42-be49-437a-bc3d-19334cdb7400" (UID: "f6db9f42-be49-437a-bc3d-19334cdb7400"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:32:26.992275 kubelet[2167]: I1213 14:32:26.992215 2167 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-var-run-calico\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.992275 kubelet[2167]: I1213 14:32:26.992277 2167 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-var-lib-calico\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.992698 kubelet[2167]: I1213 14:32:26.992301 2167 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-lib-modules\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.992698 kubelet[2167]: I1213 14:32:26.992320 2167 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-log-dir\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.992698 kubelet[2167]: I1213 14:32:26.992344 2167 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f6db9f42-be49-437a-bc3d-19334cdb7400-node-certs\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.992698 kubelet[2167]: I1213 14:32:26.992375 2167 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-bin-dir\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.992698 kubelet[2167]: I1213 14:32:26.992395 2167 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-cni-net-dir\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.992698 kubelet[2167]: I1213 14:32:26.992413 2167 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f6db9f42-be49-437a-bc3d-19334cdb7400-policysync\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.992698 kubelet[2167]: I1213 14:32:26.992433 2167 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-8xz6x\" (UniqueName: \"kubernetes.io/projected/f6db9f42-be49-437a-bc3d-19334cdb7400-kube-api-access-8xz6x\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:26.993240 kubelet[2167]: I1213 14:32:26.992451 2167 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f6db9f42-be49-437a-bc3d-19334cdb7400-tigera-ca-bundle\") on node \"ci-3510-3-6-7c7e0f778a25ef561269.c.flatcar-212911.internal\" DevicePath \"\"" Dec 13 14:32:27.090000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:27.090000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d0c140 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:32:27.090000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:27.090000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:27.090000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e74c80 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:32:27.090000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:27.094000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:27.094000 audit[2034]: AVC avc: denied { watch } for pid=2034 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:27.094000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d0ce20 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:32:27.094000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:27.094000 audit[2034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e74e60 a2=fc6 a3=0 items=0 ppid=1872 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c69,c1017 key=(null) Dec 13 14:32:27.094000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:27.146760 env[1234]: time="2024-12-13T14:32:27.146686160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h8psd,Uid:04d6aa9d-16b9-4b76-825e-a684c1e96839,Namespace:calico-system,Attempt:0,}" Dec 13 14:32:27.167490 env[1234]: time="2024-12-13T14:32:27.167305517Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:27.167863 env[1234]: time="2024-12-13T14:32:27.167442296Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:27.167863 env[1234]: time="2024-12-13T14:32:27.167463785Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:27.167863 env[1234]: time="2024-12-13T14:32:27.167730503Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e127978c06c2cb83fc2a48b8ceda35848bdcfe0ed73d35a8538de97e62cc2851 pid=5981 runtime=io.containerd.runc.v2 Dec 13 14:32:27.189466 systemd[1]: Started cri-containerd-e127978c06c2cb83fc2a48b8ceda35848bdcfe0ed73d35a8538de97e62cc2851.scope. Dec 13 14:32:27.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.215000 audit: BPF prog-id=229 op=LOAD Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5981 pid=5994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323739373863303663326362383366633261343862386365646133 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5981 pid=5994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323739373863303663326362383366633261343862386365646133 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit: BPF prog-id=230 op=LOAD Dec 13 14:32:27.216000 audit[5994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185e00 items=0 ppid=5981 pid=5994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323739373863303663326362383366633261343862386365646133 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit: BPF prog-id=231 op=LOAD Dec 13 14:32:27.216000 audit[5994]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185e48 items=0 ppid=5981 pid=5994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323739373863303663326362383366633261343862386365646133 Dec 13 14:32:27.216000 audit: BPF prog-id=231 op=UNLOAD Dec 13 14:32:27.216000 audit: BPF prog-id=230 op=UNLOAD Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { perfmon } for pid=5994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit[5994]: AVC avc: denied { bpf } for pid=5994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.216000 audit: BPF prog-id=232 op=LOAD Dec 13 14:32:27.216000 audit[5994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c2258 items=0 ppid=5981 pid=5994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531323739373863303663326362383366633261343862386365646133 Dec 13 14:32:27.240068 env[1234]: time="2024-12-13T14:32:27.239994247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h8psd,Uid:04d6aa9d-16b9-4b76-825e-a684c1e96839,Namespace:calico-system,Attempt:0,} returns sandbox id \"e127978c06c2cb83fc2a48b8ceda35848bdcfe0ed73d35a8538de97e62cc2851\"" Dec 13 14:32:27.247467 env[1234]: time="2024-12-13T14:32:27.247417853Z" level=info msg="CreateContainer within sandbox \"e127978c06c2cb83fc2a48b8ceda35848bdcfe0ed73d35a8538de97e62cc2851\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:32:27.264844 env[1234]: time="2024-12-13T14:32:27.264769545Z" level=info msg="CreateContainer within sandbox \"e127978c06c2cb83fc2a48b8ceda35848bdcfe0ed73d35a8538de97e62cc2851\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a98b4c30b9ef4fb439e7ba7da9dc9604c4ccfd6dd4a248800fa213c1dc418275\"" Dec 13 14:32:27.266997 env[1234]: time="2024-12-13T14:32:27.266948310Z" level=info msg="StartContainer for \"a98b4c30b9ef4fb439e7ba7da9dc9604c4ccfd6dd4a248800fa213c1dc418275\"" Dec 13 14:32:27.297033 systemd[1]: Started cri-containerd-a98b4c30b9ef4fb439e7ba7da9dc9604c4ccfd6dd4a248800fa213c1dc418275.scope. Dec 13 14:32:27.348000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.348000 audit[6025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f1a9e46bcb8 items=0 ppid=5981 pid=6025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139386234633330623965663466623433396537626137646139646339 Dec 13 14:32:27.349000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.349000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.349000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.349000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.349000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.349000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.349000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.349000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.349000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.349000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.349000 audit: BPF prog-id=233 op=LOAD Dec 13 14:32:27.349000 audit[6025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b4ed8 items=0 ppid=5981 pid=6025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139386234633330623965663466623433396537626137646139646339 Dec 13 14:32:27.351000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.351000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.351000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.351000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.351000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.351000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.351000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.351000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.351000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.351000 audit: BPF prog-id=234 op=LOAD Dec 13 14:32:27.351000 audit[6025]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b4f28 items=0 ppid=5981 pid=6025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139386234633330623965663466623433396537626137646139646339 Dec 13 14:32:27.352000 audit: BPF prog-id=234 op=UNLOAD Dec 13 14:32:27.352000 audit: BPF prog-id=233 op=UNLOAD Dec 13 14:32:27.352000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.352000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.352000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.352000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.352000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.352000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.352000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.352000 audit[6025]: AVC avc: denied { perfmon } for pid=6025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.352000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.352000 audit[6025]: AVC avc: denied { bpf } for pid=6025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.352000 audit: BPF prog-id=235 op=LOAD Dec 13 14:32:27.352000 audit[6025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b4fb8 items=0 ppid=5981 pid=6025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139386234633330623965663466623433396537626137646139646339 Dec 13 14:32:27.378748 env[1234]: time="2024-12-13T14:32:27.378429544Z" level=info msg="StartContainer for \"a98b4c30b9ef4fb439e7ba7da9dc9604c4ccfd6dd4a248800fa213c1dc418275\" returns successfully" Dec 13 14:32:27.402572 systemd[1]: cri-containerd-a98b4c30b9ef4fb439e7ba7da9dc9604c4ccfd6dd4a248800fa213c1dc418275.scope: Deactivated successfully. Dec 13 14:32:27.405000 audit: BPF prog-id=235 op=UNLOAD Dec 13 14:32:27.447176 env[1234]: time="2024-12-13T14:32:27.447095786Z" level=info msg="shim disconnected" id=a98b4c30b9ef4fb439e7ba7da9dc9604c4ccfd6dd4a248800fa213c1dc418275 Dec 13 14:32:27.447176 env[1234]: time="2024-12-13T14:32:27.447175946Z" level=warning msg="cleaning up after shim disconnected" id=a98b4c30b9ef4fb439e7ba7da9dc9604c4ccfd6dd4a248800fa213c1dc418275 namespace=k8s.io Dec 13 14:32:27.447675 env[1234]: time="2024-12-13T14:32:27.447190922Z" level=info msg="cleaning up dead shim" Dec 13 14:32:27.461677 env[1234]: time="2024-12-13T14:32:27.461583948Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:32:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6063 runtime=io.containerd.runc.v2\n" Dec 13 14:32:27.483954 kubelet[2167]: I1213 14:32:27.483857 2167 scope.go:117] "RemoveContainer" containerID="49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6" Dec 13 14:32:27.492340 systemd[1]: Removed slice kubepods-besteffort-podf6db9f42_be49_437a_bc3d_19334cdb7400.slice. Dec 13 14:32:27.492516 systemd[1]: kubepods-besteffort-podf6db9f42_be49_437a_bc3d_19334cdb7400.slice: Consumed 11.563s CPU time. Dec 13 14:32:27.496025 env[1234]: time="2024-12-13T14:32:27.495927201Z" level=info msg="RemoveContainer for \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\"" Dec 13 14:32:27.510661 env[1234]: time="2024-12-13T14:32:27.510557027Z" level=info msg="RemoveContainer for \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\" returns successfully" Dec 13 14:32:27.512685 kubelet[2167]: I1213 14:32:27.511213 2167 scope.go:117] "RemoveContainer" containerID="63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e" Dec 13 14:32:27.516194 env[1234]: time="2024-12-13T14:32:27.516114350Z" level=info msg="CreateContainer within sandbox \"e127978c06c2cb83fc2a48b8ceda35848bdcfe0ed73d35a8538de97e62cc2851\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:32:27.525141 env[1234]: time="2024-12-13T14:32:27.525080795Z" level=info msg="RemoveContainer for \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\"" Dec 13 14:32:27.531169 env[1234]: time="2024-12-13T14:32:27.531110734Z" level=info msg="RemoveContainer for \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\" returns successfully" Dec 13 14:32:27.532024 kubelet[2167]: I1213 14:32:27.531969 2167 scope.go:117] "RemoveContainer" containerID="c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86" Dec 13 14:32:27.534304 env[1234]: time="2024-12-13T14:32:27.534260427Z" level=info msg="RemoveContainer for \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\"" Dec 13 14:32:27.551637 env[1234]: time="2024-12-13T14:32:27.551522475Z" level=info msg="CreateContainer within sandbox \"e127978c06c2cb83fc2a48b8ceda35848bdcfe0ed73d35a8538de97e62cc2851\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"20410c7884708da566757cf344ed7983868d0d52d7077650cd6bf20880af7c26\"" Dec 13 14:32:27.552635 env[1234]: time="2024-12-13T14:32:27.552564825Z" level=info msg="StartContainer for \"20410c7884708da566757cf344ed7983868d0d52d7077650cd6bf20880af7c26\"" Dec 13 14:32:27.558175 env[1234]: time="2024-12-13T14:32:27.557280739Z" level=info msg="RemoveContainer for \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\" returns successfully" Dec 13 14:32:27.558933 kubelet[2167]: I1213 14:32:27.558741 2167 scope.go:117] "RemoveContainer" containerID="49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6" Dec 13 14:32:27.559228 env[1234]: time="2024-12-13T14:32:27.559133292Z" level=error msg="ContainerStatus for \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\": not found" Dec 13 14:32:27.559429 kubelet[2167]: E1213 14:32:27.559398 2167 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\": not found" containerID="49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6" Dec 13 14:32:27.559637 kubelet[2167]: I1213 14:32:27.559469 2167 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6"} err="failed to get container status \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\": rpc error: code = NotFound desc = an error occurred when try to find container \"49b6384046556c08f0206fe21d07e7522e5dcb924868b5f4a7889cea11d40bf6\": not found" Dec 13 14:32:27.559637 kubelet[2167]: I1213 14:32:27.559490 2167 scope.go:117] "RemoveContainer" containerID="63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e" Dec 13 14:32:27.560394 env[1234]: time="2024-12-13T14:32:27.560313245Z" level=error msg="ContainerStatus for \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\": not found" Dec 13 14:32:27.560566 kubelet[2167]: E1213 14:32:27.560537 2167 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\": not found" containerID="63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e" Dec 13 14:32:27.560797 kubelet[2167]: I1213 14:32:27.560604 2167 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e"} err="failed to get container status \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\": rpc error: code = NotFound desc = an error occurred when try to find container \"63898d996230c8228d863a0dea025813d0664a1889ebf1378b8009f168d4721e\": not found" Dec 13 14:32:27.560797 kubelet[2167]: I1213 14:32:27.560641 2167 scope.go:117] "RemoveContainer" containerID="c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86" Dec 13 14:32:27.560982 env[1234]: time="2024-12-13T14:32:27.560912475Z" level=error msg="ContainerStatus for \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\": not found" Dec 13 14:32:27.561139 kubelet[2167]: E1213 14:32:27.561113 2167 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\": not found" containerID="c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86" Dec 13 14:32:27.561251 kubelet[2167]: I1213 14:32:27.561161 2167 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86"} err="failed to get container status \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\": rpc error: code = NotFound desc = an error occurred when try to find container \"c04d8571f85494eb66541e3f558936159f2d71d4021691eddc7cf4b48d208a86\": not found" Dec 13 14:32:27.585633 systemd[1]: Started cri-containerd-20410c7884708da566757cf344ed7983868d0d52d7077650cd6bf20880af7c26.scope. Dec 13 14:32:27.620000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648111 kernel: kauditd_printk_skb: 140 callbacks suppressed Dec 13 14:32:27.648381 kernel: audit: type=1400 audit(1734100347.620:1713): avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.620000 audit[6083]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f310c2b4a88 items=0 ppid=5981 pid=6083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.681749 kernel: audit: type=1300 audit(1734100347.620:1713): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f310c2b4a88 items=0 ppid=5981 pid=6083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230343130633738383437303864613536363735376366333434656437 Dec 13 14:32:27.712644 kernel: audit: type=1327 audit(1734100347.620:1713): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230343130633738383437303864613536363735376366333434656437 Dec 13 14:32:27.623000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.735809 kernel: audit: type=1400 audit(1734100347.623:1714): avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.623000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.772639 kernel: audit: type=1400 audit(1734100347.623:1714): avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.772811 kernel: audit: type=1400 audit(1734100347.623:1714): avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.623000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.623000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.623000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.825483 kernel: audit: type=1400 audit(1734100347.623:1714): avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.825924 kernel: audit: type=1400 audit(1734100347.623:1714): avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.825998 kernel: audit: type=1400 audit(1734100347.623:1714): avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.623000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.847059 env[1234]: time="2024-12-13T14:32:27.846957496Z" level=info msg="StartContainer for \"20410c7884708da566757cf344ed7983868d0d52d7077650cd6bf20880af7c26\" returns successfully" Dec 13 14:32:27.623000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.869645 kernel: audit: type=1400 audit(1734100347.623:1714): avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.623000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.623000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.623000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.623000 audit: BPF prog-id=236 op=LOAD Dec 13 14:32:27.623000 audit[6083]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00030c208 items=0 ppid=5981 pid=6083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230343130633738383437303864613536363735376366333434656437 Dec 13 14:32:27.647000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.647000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.647000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.647000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.647000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.647000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.647000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.647000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.647000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.647000 audit: BPF prog-id=237 op=LOAD Dec 13 14:32:27.647000 audit[6083]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00030c258 items=0 ppid=5981 pid=6083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230343130633738383437303864613536363735376366333434656437 Dec 13 14:32:27.647000 audit: BPF prog-id=237 op=UNLOAD Dec 13 14:32:27.647000 audit: BPF prog-id=236 op=UNLOAD Dec 13 14:32:27.648000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648000 audit[6083]: AVC avc: denied { perfmon } for pid=6083 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648000 audit[6083]: AVC avc: denied { bpf } for pid=6083 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:27.648000 audit: BPF prog-id=238 op=LOAD Dec 13 14:32:27.648000 audit[6083]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00030c2e8 items=0 ppid=5981 pid=6083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230343130633738383437303864613536363735376366333434656437 Dec 13 14:32:28.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.53:22-139.178.68.195:55172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:28.182789 systemd[1]: Started sshd@26-10.128.0.53:22-139.178.68.195:55172.service. Dec 13 14:32:28.461262 systemd[1]: cri-containerd-20410c7884708da566757cf344ed7983868d0d52d7077650cd6bf20880af7c26.scope: Deactivated successfully. Dec 13 14:32:28.465000 audit: BPF prog-id=238 op=UNLOAD Dec 13 14:32:28.492000 audit[6116]: USER_ACCT pid=6116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:28.495861 sshd[6116]: Accepted publickey for core from 139.178.68.195 port 55172 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:32:28.496000 audit[6116]: CRED_ACQ pid=6116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:28.497000 audit[6116]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1cffa090 a2=3 a3=0 items=0 ppid=1 pid=6116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:28.497000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:28.498951 sshd[6116]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:28.505418 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-20410c7884708da566757cf344ed7983868d0d52d7077650cd6bf20880af7c26-rootfs.mount: Deactivated successfully. Dec 13 14:32:28.523116 systemd[1]: Started session-26.scope. Dec 13 14:32:28.524710 systemd-logind[1218]: New session 26 of user core. Dec 13 14:32:28.529550 env[1234]: time="2024-12-13T14:32:28.529440005Z" level=info msg="shim disconnected" id=20410c7884708da566757cf344ed7983868d0d52d7077650cd6bf20880af7c26 Dec 13 14:32:28.529550 env[1234]: time="2024-12-13T14:32:28.529513694Z" level=warning msg="cleaning up after shim disconnected" id=20410c7884708da566757cf344ed7983868d0d52d7077650cd6bf20880af7c26 namespace=k8s.io Dec 13 14:32:28.529550 env[1234]: time="2024-12-13T14:32:28.529531711Z" level=info msg="cleaning up dead shim" Dec 13 14:32:28.536000 audit[6116]: USER_START pid=6116 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:28.540000 audit[6133]: CRED_ACQ pid=6133 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:28.556521 env[1234]: time="2024-12-13T14:32:28.556456691Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:32:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6132 runtime=io.containerd.runc.v2\n" Dec 13 14:32:28.698528 kubelet[2167]: I1213 14:32:28.698482 2167 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="f6db9f42-be49-437a-bc3d-19334cdb7400" path="/var/lib/kubelet/pods/f6db9f42-be49-437a-bc3d-19334cdb7400/volumes" Dec 13 14:32:28.800727 sshd[6116]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:28.802000 audit[6116]: USER_END pid=6116 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:28.803000 audit[6116]: CRED_DISP pid=6116 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:28.806325 systemd[1]: sshd@26-10.128.0.53:22-139.178.68.195:55172.service: Deactivated successfully. Dec 13 14:32:28.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.53:22-139.178.68.195:55172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:28.807828 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:32:28.808848 systemd-logind[1218]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:32:28.810204 systemd-logind[1218]: Removed session 26. Dec 13 14:32:29.230000 audit[4237]: AVC avc: denied { watch } for pid=4237 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_31_03.236315408/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c1,c897 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c1,c897 tclass=file permissive=0 Dec 13 14:32:29.230000 audit[4237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001413140 a2=fc6 a3=0 items=0 ppid=3676 pid=4237 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c1,c897 key=(null) Dec 13 14:32:29.230000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:32:29.562669 env[1234]: time="2024-12-13T14:32:29.562491452Z" level=info msg="CreateContainer within sandbox \"e127978c06c2cb83fc2a48b8ceda35848bdcfe0ed73d35a8538de97e62cc2851\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:32:29.591520 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2307743.mount: Deactivated successfully. Dec 13 14:32:29.594215 env[1234]: time="2024-12-13T14:32:29.594151433Z" level=info msg="CreateContainer within sandbox \"e127978c06c2cb83fc2a48b8ceda35848bdcfe0ed73d35a8538de97e62cc2851\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"06c69042c0ca0ce2303a162bffc6ca2d6f694bfeff9b8660c92876ff0aacde70\"" Dec 13 14:32:29.595355 env[1234]: time="2024-12-13T14:32:29.595316252Z" level=info msg="StartContainer for \"06c69042c0ca0ce2303a162bffc6ca2d6f694bfeff9b8660c92876ff0aacde70\"" Dec 13 14:32:29.632367 systemd[1]: Started cri-containerd-06c69042c0ca0ce2303a162bffc6ca2d6f694bfeff9b8660c92876ff0aacde70.scope. Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f01f84a5428 items=0 ppid=5981 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036633639303432633063613063653233303361313632626666633663 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit: BPF prog-id=239 op=LOAD Dec 13 14:32:29.664000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cbb98 items=0 ppid=5981 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036633639303432633063613063653233303361313632626666633663 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit: BPF prog-id=240 op=LOAD Dec 13 14:32:29.664000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002cbbe8 items=0 ppid=5981 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036633639303432633063613063653233303361313632626666633663 Dec 13 14:32:29.664000 audit: BPF prog-id=240 op=UNLOAD Dec 13 14:32:29.664000 audit: BPF prog-id=239 op=UNLOAD Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { perfmon } for pid=6163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit[6163]: AVC avc: denied { bpf } for pid=6163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.664000 audit: BPF prog-id=241 op=LOAD Dec 13 14:32:29.664000 audit[6163]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002cbc78 items=0 ppid=5981 pid=6163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036633639303432633063613063653233303361313632626666633663 Dec 13 14:32:29.688649 env[1234]: time="2024-12-13T14:32:29.688537263Z" level=info msg="StartContainer for \"06c69042c0ca0ce2303a162bffc6ca2d6f694bfeff9b8660c92876ff0aacde70\" returns successfully" Dec 13 14:32:30.072708 kubelet[2167]: I1213 14:32:30.072660 2167 scope.go:117] "RemoveContainer" containerID="548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55" Dec 13 14:32:30.074634 env[1234]: time="2024-12-13T14:32:30.074558960Z" level=info msg="RemoveContainer for \"548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55\"" Dec 13 14:32:30.080116 env[1234]: time="2024-12-13T14:32:30.080063227Z" level=info msg="RemoveContainer for \"548cf186a638fb1e229c46f84d8dd431e8100c0b3c92e3818a86620f32168a55\" returns successfully" Dec 13 14:32:30.082311 env[1234]: time="2024-12-13T14:32:30.082240761Z" level=info msg="StopPodSandbox for \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\"" Dec 13 14:32:30.082544 env[1234]: time="2024-12-13T14:32:30.082382316Z" level=info msg="TearDown network for sandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" successfully" Dec 13 14:32:30.082544 env[1234]: time="2024-12-13T14:32:30.082441327Z" level=info msg="StopPodSandbox for \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" returns successfully" Dec 13 14:32:30.083173 env[1234]: time="2024-12-13T14:32:30.083133158Z" level=info msg="RemovePodSandbox for \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\"" Dec 13 14:32:30.083408 env[1234]: time="2024-12-13T14:32:30.083329283Z" level=info msg="Forcibly stopping sandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\"" Dec 13 14:32:30.083513 env[1234]: time="2024-12-13T14:32:30.083469077Z" level=info msg="TearDown network for sandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" successfully" Dec 13 14:32:30.088128 env[1234]: time="2024-12-13T14:32:30.088027225Z" level=info msg="RemovePodSandbox \"ecd7bceed43f539c5c19377824d7f9fa5f292f835853e53e43137f54e43b7267\" returns successfully" Dec 13 14:32:30.088788 env[1234]: time="2024-12-13T14:32:30.088747812Z" level=info msg="StopPodSandbox for \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\"" Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.138 [WARNING][6225] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.138 [INFO][6225] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.138 [INFO][6225] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" iface="eth0" netns="" Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.139 [INFO][6225] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.139 [INFO][6225] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.166 [INFO][6231] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.166 [INFO][6231] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.166 [INFO][6231] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.175 [WARNING][6231] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.175 [INFO][6231] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.176 [INFO][6231] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:30.179702 env[1234]: 2024-12-13 14:32:30.178 [INFO][6225] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:32:30.180506 env[1234]: time="2024-12-13T14:32:30.179798362Z" level=info msg="TearDown network for sandbox \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\" successfully" Dec 13 14:32:30.180506 env[1234]: time="2024-12-13T14:32:30.179854268Z" level=info msg="StopPodSandbox for \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\" returns successfully" Dec 13 14:32:30.181279 env[1234]: time="2024-12-13T14:32:30.181197402Z" level=info msg="RemovePodSandbox for \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\"" Dec 13 14:32:30.181692 env[1234]: time="2024-12-13T14:32:30.181508585Z" level=info msg="Forcibly stopping sandbox \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\"" Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.234 [WARNING][6251] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" WorkloadEndpoint="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.234 [INFO][6251] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.234 [INFO][6251] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" iface="eth0" netns="" Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.235 [INFO][6251] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.235 [INFO][6251] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.266 [INFO][6257] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.267 [INFO][6257] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.267 [INFO][6257] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.274 [WARNING][6257] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.274 [INFO][6257] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" HandleID="k8s-pod-network.d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Workload="ci--3510--3--6--7c7e0f778a25ef561269.c.flatcar--212911.internal-k8s-calico--kube--controllers--84f5cc5c9f--jcfkf-eth0" Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.276 [INFO][6257] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:30.278807 env[1234]: 2024-12-13 14:32:30.277 [INFO][6251] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326" Dec 13 14:32:30.279686 env[1234]: time="2024-12-13T14:32:30.278845076Z" level=info msg="TearDown network for sandbox \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\" successfully" Dec 13 14:32:30.284735 env[1234]: time="2024-12-13T14:32:30.284666966Z" level=info msg="RemovePodSandbox \"d660dbfbdf828ba63e33c38ce5fa6f60ce1082b79d865ed71b99a389540ae326\" returns successfully" Dec 13 14:32:30.285656 env[1234]: time="2024-12-13T14:32:30.285587972Z" level=info msg="StopPodSandbox for \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\"" Dec 13 14:32:30.285824 env[1234]: time="2024-12-13T14:32:30.285748766Z" level=info msg="TearDown network for sandbox \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\" successfully" Dec 13 14:32:30.285894 env[1234]: time="2024-12-13T14:32:30.285810607Z" level=info msg="StopPodSandbox for \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\" returns successfully" Dec 13 14:32:30.286447 env[1234]: time="2024-12-13T14:32:30.286407474Z" level=info msg="RemovePodSandbox for \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\"" Dec 13 14:32:30.286567 env[1234]: time="2024-12-13T14:32:30.286454061Z" level=info msg="Forcibly stopping sandbox \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\"" Dec 13 14:32:30.286660 env[1234]: time="2024-12-13T14:32:30.286577499Z" level=info msg="TearDown network for sandbox \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\" successfully" Dec 13 14:32:30.290831 env[1234]: time="2024-12-13T14:32:30.290784991Z" level=info msg="RemovePodSandbox \"597f2a0ebec7a790f433be6d1a9b6479f2f8cc47fc1bb21cbf86c93dec5672f5\" returns successfully" Dec 13 14:32:30.588840 kubelet[2167]: I1213 14:32:30.588779 2167 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-h8psd" podStartSLOduration=4.58870973 podStartE2EDuration="4.58870973s" podCreationTimestamp="2024-12-13 14:32:26 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:32:30.586301126 +0000 UTC m=+124.156072807" watchObservedRunningTime="2024-12-13 14:32:30.58870973 +0000 UTC m=+124.158481432" Dec 13 14:32:31.048000 audit[6337]: AVC avc: denied { write } for pid=6337 comm="tee" name="fd" dev="proc" ino=36928 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:31.048000 audit[6337]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0fa889c4 a2=241 a3=1b6 items=1 ppid=6305 pid=6337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.048000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:32:31.048000 audit: PATH item=0 name="/dev/fd/63" inode=36783 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:31.048000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:31.059000 audit[6322]: AVC avc: denied { write } for pid=6322 comm="tee" name="fd" dev="proc" ino=36792 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:31.059000 audit[6322]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2854d9b5 a2=241 a3=1b6 items=1 ppid=6296 pid=6322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.059000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:32:31.059000 audit: PATH item=0 name="/dev/fd/63" inode=36773 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:31.060000 audit[4399]: AVC avc: denied { watch } for pid=4399 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_31_03.2481532512/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c224,c644 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c224,c644 tclass=file permissive=0 Dec 13 14:32:31.060000 audit[4399]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001fbece0 a2=fc6 a3=0 items=0 ppid=4102 pid=4399 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c224,c644 key=(null) Dec 13 14:32:31.060000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:32:31.059000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:31.084000 audit[6328]: AVC avc: denied { write } for pid=6328 comm="tee" name="fd" dev="proc" ino=36804 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:31.084000 audit[6328]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa699f9c5 a2=241 a3=1b6 items=1 ppid=6300 pid=6328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.084000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:32:31.084000 audit: PATH item=0 name="/dev/fd/63" inode=36919 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:31.084000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:31.113000 audit[6347]: AVC avc: denied { write } for pid=6347 comm="tee" name="fd" dev="proc" ino=36937 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:31.113000 audit[6347]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1331a9c4 a2=241 a3=1b6 items=1 ppid=6297 pid=6347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.113000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:32:31.113000 audit: PATH item=0 name="/dev/fd/63" inode=36807 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:31.113000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:31.134000 audit[6349]: AVC avc: denied { write } for pid=6349 comm="tee" name="fd" dev="proc" ino=36817 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:31.134000 audit[6349]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9eb429c4 a2=241 a3=1b6 items=1 ppid=6301 pid=6349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.134000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:32:31.134000 audit: PATH item=0 name="/dev/fd/63" inode=36810 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:31.134000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:31.149000 audit[6358]: AVC avc: denied { write } for pid=6358 comm="tee" name="fd" dev="proc" ino=36819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:31.149000 audit[6364]: AVC avc: denied { write } for pid=6364 comm="tee" name="fd" dev="proc" ino=36944 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:31.149000 audit[6364]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5274e9b4 a2=241 a3=1b6 items=1 ppid=6306 pid=6364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.149000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:32:31.149000 audit: PATH item=0 name="/dev/fd/63" inode=36812 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:31.149000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:31.149000 audit[6358]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc01a409c6 a2=241 a3=1b6 items=1 ppid=6292 pid=6358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.149000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:32:31.149000 audit: PATH item=0 name="/dev/fd/63" inode=36811 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:31.149000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:31.461000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.461000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.461000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.461000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.461000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.461000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.461000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.461000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.461000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.461000 audit: BPF prog-id=242 op=LOAD Dec 13 14:32:31.461000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffefee9350 a2=98 a3=3 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.461000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.461000 audit: BPF prog-id=242 op=UNLOAD Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit: BPF prog-id=243 op=LOAD Dec 13 14:32:31.464000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffefee9130 a2=74 a3=540051 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.464000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.464000 audit: BPF prog-id=243 op=UNLOAD Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.464000 audit: BPF prog-id=244 op=LOAD Dec 13 14:32:31.464000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffefee9160 a2=94 a3=2 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.464000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.464000 audit: BPF prog-id=244 op=UNLOAD Dec 13 14:32:31.660000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.660000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.660000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.660000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.660000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.660000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.660000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.660000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.660000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.660000 audit: BPF prog-id=245 op=LOAD Dec 13 14:32:31.660000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffefee9020 a2=40 a3=1 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.660000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.661000 audit: BPF prog-id=245 op=UNLOAD Dec 13 14:32:31.661000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.661000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffefee90f0 a2=50 a3=7fffefee91d0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.661000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffefee9030 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffefee9060 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffefee8f70 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffefee9080 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffefee9060 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffefee9050 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffefee9080 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffefee9060 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffefee9080 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffefee9050 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffefee90c0 a2=28 a3=0 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffefee8e70 a2=50 a3=1 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit: BPF prog-id=246 op=LOAD Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffefee8e70 a2=94 a3=5 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit: BPF prog-id=246 op=UNLOAD Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffefee8f20 a2=50 a3=1 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffefee9040 a2=4 a3=38 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.681000 audit[6403]: AVC avc: denied { confidentiality } for pid=6403 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:31.681000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffefee9090 a2=94 a3=6 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.686000 audit[6403]: AVC avc: denied { confidentiality } for pid=6403 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:31.686000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffefee8840 a2=94 a3=83 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.686000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { perfmon } for pid=6403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { bpf } for pid=6403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.687000 audit[6403]: AVC avc: denied { confidentiality } for pid=6403 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:31.687000 audit[6403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffefee8840 a2=94 a3=83 items=0 ppid=6307 pid=6403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.687000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:31.700000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.700000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.700000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.700000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.700000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.700000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.700000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.700000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.700000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.700000 audit: BPF prog-id=247 op=LOAD Dec 13 14:32:31.700000 audit[6426]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb642df80 a2=98 a3=1999999999999999 items=0 ppid=6307 pid=6426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.700000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:31.701000 audit: BPF prog-id=247 op=UNLOAD Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit: BPF prog-id=248 op=LOAD Dec 13 14:32:31.701000 audit[6426]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb642de60 a2=74 a3=ffff items=0 ppid=6307 pid=6426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.701000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:31.701000 audit: BPF prog-id=248 op=UNLOAD Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { perfmon } for pid=6426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit[6426]: AVC avc: denied { bpf } for pid=6426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.701000 audit: BPF prog-id=249 op=LOAD Dec 13 14:32:31.701000 audit[6426]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb642dea0 a2=40 a3=7ffcb642e080 items=0 ppid=6307 pid=6426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.701000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:31.701000 audit: BPF prog-id=249 op=UNLOAD Dec 13 14:32:31.816000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.816000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.816000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.816000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.816000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.816000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.816000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.816000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.816000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.816000 audit: BPF prog-id=250 op=LOAD Dec 13 14:32:31.816000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6be76b60 a2=98 a3=ffffffff items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.816000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.818000 audit: BPF prog-id=250 op=UNLOAD Dec 13 14:32:31.818000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.818000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.818000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.818000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.818000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.818000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.818000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.818000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.818000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.818000 audit: BPF prog-id=251 op=LOAD Dec 13 14:32:31.818000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6be76970 a2=74 a3=540051 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.818000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.820000 audit: BPF prog-id=251 op=UNLOAD Dec 13 14:32:31.820000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.820000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.820000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.820000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.820000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.820000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.820000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.820000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.820000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.820000 audit: BPF prog-id=252 op=LOAD Dec 13 14:32:31.820000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6be769a0 a2=94 a3=2 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.820000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.821000 audit: BPF prog-id=252 op=UNLOAD Dec 13 14:32:31.821000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.821000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6be76870 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.821000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.822000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.822000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6be768a0 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.822000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.822000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6be767b0 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.822000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.822000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6be768c0 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.822000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.822000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6be768a0 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.822000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.822000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6be76890 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.822000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.822000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6be768c0 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.822000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.822000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6be768a0 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.822000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.822000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6be768c0 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.822000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.822000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6be76890 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.822000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.822000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6be76900 a2=28 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.822000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.823000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.823000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.823000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.823000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.823000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.823000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.823000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.823000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.823000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.823000 audit: BPF prog-id=253 op=LOAD Dec 13 14:32:31.823000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6be76770 a2=40 a3=0 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.823000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.824000 audit: BPF prog-id=253 op=UNLOAD Dec 13 14:32:31.825000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.825000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff6be76760 a2=50 a3=2800 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.825000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.825000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.825000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff6be76760 a2=50 a3=2800 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.825000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit: BPF prog-id=254 op=LOAD Dec 13 14:32:31.827000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6be75f80 a2=94 a3=2 items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.827000 audit: BPF prog-id=254 op=UNLOAD Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { perfmon } for pid=6449 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit[6449]: AVC avc: denied { bpf } for pid=6449 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.827000 audit: BPF prog-id=255 op=LOAD Dec 13 14:32:31.827000 audit[6449]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6be76080 a2=94 a3=2d items=0 ppid=6307 pid=6449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.827000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit: BPF prog-id=256 op=LOAD Dec 13 14:32:31.837000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe9385440 a2=98 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:31.837000 audit: BPF prog-id=256 op=UNLOAD Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit: BPF prog-id=257 op=LOAD Dec 13 14:32:31.837000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe9385220 a2=74 a3=540051 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:31.837000 audit: BPF prog-id=257 op=UNLOAD Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.837000 audit: BPF prog-id=258 op=LOAD Dec 13 14:32:31.837000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe9385250 a2=94 a3=2 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.837000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:31.838000 audit: BPF prog-id=258 op=UNLOAD Dec 13 14:32:31.989000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.989000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.989000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.989000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.989000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.989000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.989000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.989000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.989000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.989000 audit: BPF prog-id=259 op=LOAD Dec 13 14:32:31.989000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffe9385110 a2=40 a3=1 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:31.989000 audit: BPF prog-id=259 op=UNLOAD Dec 13 14:32:31.989000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:31.989000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffe93851e0 a2=50 a3=7fffe93852c0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:31.989000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe9385120 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe9385150 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe9385060 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe9385170 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe9385150 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe9385140 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe9385170 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe9385150 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe9385170 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe9385140 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.002000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.002000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffe93851b0 a2=28 a3=0 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffe9384f60 a2=50 a3=1 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit: BPF prog-id=260 op=LOAD Dec 13 14:32:32.003000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe9384f60 a2=94 a3=5 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.003000 audit: BPF prog-id=260 op=UNLOAD Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffe9385010 a2=50 a3=1 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffe9385130 a2=4 a3=38 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.003000 audit[6455]: AVC avc: denied { confidentiality } for pid=6455 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:32.003000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe9385180 a2=94 a3=6 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.003000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { confidentiality } for pid=6455 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:32.004000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe9384930 a2=94 a3=83 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { perfmon } for pid=6455 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.004000 audit[6455]: AVC avc: denied { confidentiality } for pid=6455 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:32.004000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffe9384930 a2=94 a3=83 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.004000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.005000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.005000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffe9386370 a2=10 a3=f1f00800 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.005000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.005000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.005000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffe9386210 a2=10 a3=3 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.005000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.005000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.005000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffe93861b0 a2=10 a3=3 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.005000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.005000 audit[6455]: AVC avc: denied { bpf } for pid=6455 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:32.005000 audit[6455]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffe93861b0 a2=10 a3=7 items=0 ppid=6307 pid=6455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:32.005000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:32.016000 audit: BPF prog-id=255 op=UNLOAD Dec 13 14:32:33.848861 systemd[1]: Started sshd@27-10.128.0.53:22-139.178.68.195:55188.service. Dec 13 14:32:33.875479 kernel: kauditd_printk_skb: 597 callbacks suppressed Dec 13 14:32:33.876023 kernel: audit: type=1130 audit(1734100353.849:1835): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.128.0.53:22-139.178.68.195:55188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.128.0.53:22-139.178.68.195:55188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:34.175902 kernel: audit: type=1101 audit(1734100354.145:1836): pid=6495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.145000 audit[6495]: USER_ACCT pid=6495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.176926 sshd[6495]: Accepted publickey for core from 139.178.68.195 port 55188 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:32:34.177399 sshd[6495]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:34.175000 audit[6495]: CRED_ACQ pid=6495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.191255 systemd[1]: Started session-27.scope. Dec 13 14:32:34.192684 systemd-logind[1218]: New session 27 of user core. Dec 13 14:32:34.221461 kernel: audit: type=1103 audit(1734100354.175:1837): pid=6495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.221627 kernel: audit: type=1006 audit(1734100354.175:1838): pid=6495 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:32:34.175000 audit[6495]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeac10cf0 a2=3 a3=0 items=0 ppid=1 pid=6495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.175000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:34.250648 kernel: audit: type=1300 audit(1734100354.175:1838): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeac10cf0 a2=3 a3=0 items=0 ppid=1 pid=6495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:34.250715 kernel: audit: type=1327 audit(1734100354.175:1838): proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:34.204000 audit[6495]: USER_START pid=6495 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.259693 kernel: audit: type=1105 audit(1734100354.204:1839): pid=6495 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.208000 audit[6497]: CRED_ACQ pid=6497 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.292726 kernel: audit: type=1103 audit(1734100354.208:1840): pid=6497 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.466496 sshd[6495]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:34.468000 audit[6495]: USER_END pid=6495 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.502643 kernel: audit: type=1106 audit(1734100354.468:1841): pid=6495 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.505191 systemd-logind[1218]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:32:34.472000 audit[6495]: CRED_DISP pid=6495 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:32:34.512045 systemd[1]: sshd@27-10.128.0.53:22-139.178.68.195:55188.service: Deactivated successfully. Dec 13 14:32:34.513517 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:32:34.516432 systemd-logind[1218]: Removed session 27. Dec 13 14:32:34.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.128.0.53:22-139.178.68.195:55188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:34.532647 kernel: audit: type=1104 audit(1734100354.472:1842): pid=6495 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success'