Dec 13 02:20:36.111323 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:20:36.111366 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:20:36.111383 kernel: BIOS-provided physical RAM map: Dec 13 02:20:36.111394 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 02:20:36.111445 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 02:20:36.111458 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 02:20:36.111475 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Dec 13 02:20:36.111487 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Dec 13 02:20:36.111499 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Dec 13 02:20:36.111510 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 02:20:36.111522 kernel: NX (Execute Disable) protection: active Dec 13 02:20:36.111534 kernel: SMBIOS 2.7 present. Dec 13 02:20:36.111546 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Dec 13 02:20:36.111557 kernel: Hypervisor detected: KVM Dec 13 02:20:36.111575 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 02:20:36.111588 kernel: kvm-clock: cpu 0, msr 5019b001, primary cpu clock Dec 13 02:20:36.111601 kernel: kvm-clock: using sched offset of 7650989480 cycles Dec 13 02:20:36.111701 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 02:20:36.111715 kernel: tsc: Detected 2499.996 MHz processor Dec 13 02:20:36.111728 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:20:36.111744 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:20:36.111755 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Dec 13 02:20:36.111767 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:20:36.111778 kernel: Using GB pages for direct mapping Dec 13 02:20:36.111790 kernel: ACPI: Early table checksum verification disabled Dec 13 02:20:36.111802 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Dec 13 02:20:36.111815 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Dec 13 02:20:36.111827 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 02:20:36.111839 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Dec 13 02:20:36.111854 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Dec 13 02:20:36.111867 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 02:20:36.111881 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 02:20:36.111894 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Dec 13 02:20:36.111907 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 02:20:36.111920 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Dec 13 02:20:36.111941 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Dec 13 02:20:36.111954 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 02:20:36.111970 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Dec 13 02:20:36.111982 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Dec 13 02:20:36.111996 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Dec 13 02:20:36.112014 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Dec 13 02:20:36.112028 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Dec 13 02:20:36.112042 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Dec 13 02:20:36.112056 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Dec 13 02:20:36.112073 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Dec 13 02:20:36.112087 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Dec 13 02:20:36.112101 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Dec 13 02:20:36.112114 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:20:36.112128 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 02:20:36.112142 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Dec 13 02:20:36.112156 kernel: NUMA: Initialized distance table, cnt=1 Dec 13 02:20:36.112169 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Dec 13 02:20:36.112186 kernel: Zone ranges: Dec 13 02:20:36.112200 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:20:36.112215 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Dec 13 02:20:36.112228 kernel: Normal empty Dec 13 02:20:36.112242 kernel: Movable zone start for each node Dec 13 02:20:36.112256 kernel: Early memory node ranges Dec 13 02:20:36.112270 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 02:20:36.112284 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Dec 13 02:20:36.112298 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Dec 13 02:20:36.112314 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:20:36.112328 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 02:20:36.112342 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Dec 13 02:20:36.112452 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 02:20:36.112467 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 02:20:36.112481 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Dec 13 02:20:36.112495 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 02:20:36.112509 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:20:36.112523 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 02:20:36.112540 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 02:20:36.112554 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:20:36.112568 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 02:20:36.112582 kernel: TSC deadline timer available Dec 13 02:20:36.112596 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 02:20:36.112610 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Dec 13 02:20:36.112623 kernel: Booting paravirtualized kernel on KVM Dec 13 02:20:36.112639 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:20:36.112679 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 02:20:36.112695 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 02:20:36.112709 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 02:20:36.112723 kernel: pcpu-alloc: [0] 0 1 Dec 13 02:20:36.112736 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Dec 13 02:20:36.112749 kernel: kvm-guest: PV spinlocks enabled Dec 13 02:20:36.112761 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 02:20:36.112775 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Dec 13 02:20:36.112891 kernel: Policy zone: DMA32 Dec 13 02:20:36.112912 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:20:36.112931 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:20:36.112945 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:20:36.112959 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:20:36.112973 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:20:36.112988 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 123080K reserved, 0K cma-reserved) Dec 13 02:20:36.113002 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 02:20:36.113017 kernel: Kernel/User page tables isolation: enabled Dec 13 02:20:36.113030 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:20:36.113047 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:20:36.113061 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:20:36.113075 kernel: rcu: RCU event tracing is enabled. Dec 13 02:20:36.113089 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 02:20:36.113103 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:20:36.113118 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:20:36.113132 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:20:36.113147 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 02:20:36.113161 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 02:20:36.113178 kernel: random: crng init done Dec 13 02:20:36.113191 kernel: Console: colour VGA+ 80x25 Dec 13 02:20:36.113206 kernel: printk: console [ttyS0] enabled Dec 13 02:20:36.113220 kernel: ACPI: Core revision 20210730 Dec 13 02:20:36.113234 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Dec 13 02:20:36.113249 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:20:36.113263 kernel: x2apic enabled Dec 13 02:20:36.113277 kernel: Switched APIC routing to physical x2apic. Dec 13 02:20:36.113292 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Dec 13 02:20:36.113308 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) Dec 13 02:20:36.113336 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 02:20:36.113351 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 02:20:36.113365 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:20:36.113390 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 02:20:36.113407 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:20:36.113422 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 02:20:36.113437 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 02:20:36.113553 kernel: RETBleed: Vulnerable Dec 13 02:20:36.113572 kernel: Speculative Store Bypass: Vulnerable Dec 13 02:20:36.113587 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:20:36.113601 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:20:36.113614 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 02:20:36.113628 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:20:36.113646 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:20:36.113680 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:20:36.113691 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 02:20:36.113702 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 02:20:36.113714 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 02:20:36.113729 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 02:20:36.113740 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 02:20:36.113753 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 02:20:36.113765 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:20:36.113779 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 02:20:36.113793 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 02:20:36.113806 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Dec 13 02:20:36.113818 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Dec 13 02:20:36.113831 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Dec 13 02:20:36.113842 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Dec 13 02:20:36.113854 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Dec 13 02:20:36.113867 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:20:36.113883 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:20:36.113894 kernel: LSM: Security Framework initializing Dec 13 02:20:36.113908 kernel: SELinux: Initializing. Dec 13 02:20:36.113922 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:20:36.113935 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:20:36.113949 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 02:20:36.113962 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 02:20:36.113976 kernel: signal: max sigframe size: 3632 Dec 13 02:20:36.113989 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:20:36.114003 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:20:36.114019 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:20:36.114032 kernel: x86: Booting SMP configuration: Dec 13 02:20:36.114046 kernel: .... node #0, CPUs: #1 Dec 13 02:20:36.114060 kernel: kvm-clock: cpu 1, msr 5019b041, secondary cpu clock Dec 13 02:20:36.114074 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Dec 13 02:20:36.114089 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 02:20:36.114200 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 02:20:36.114218 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:20:36.114232 kernel: smpboot: Max logical packages: 1 Dec 13 02:20:36.114249 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) Dec 13 02:20:36.114264 kernel: devtmpfs: initialized Dec 13 02:20:36.114276 kernel: x86/mm: Memory block size: 128MB Dec 13 02:20:36.114290 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:20:36.114306 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 02:20:36.114320 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:20:36.114333 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:20:36.114348 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:20:36.114361 kernel: audit: type=2000 audit(1734056435.660:1): state=initialized audit_enabled=0 res=1 Dec 13 02:20:36.114379 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:20:36.114393 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:20:36.114408 kernel: cpuidle: using governor menu Dec 13 02:20:36.114421 kernel: ACPI: bus type PCI registered Dec 13 02:20:36.114435 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:20:36.114447 kernel: dca service started, version 1.12.1 Dec 13 02:20:36.114459 kernel: PCI: Using configuration type 1 for base access Dec 13 02:20:36.114472 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:20:36.114484 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:20:36.114500 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:20:36.114512 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:20:36.114524 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:20:36.114537 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:20:36.114549 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:20:36.114561 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:20:36.114573 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:20:36.114585 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:20:36.114598 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 02:20:36.114612 kernel: ACPI: Interpreter enabled Dec 13 02:20:36.114625 kernel: ACPI: PM: (supports S0 S5) Dec 13 02:20:36.114637 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:20:36.114649 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:20:36.114691 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 02:20:36.114703 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 02:20:36.114981 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:20:36.115134 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 02:20:36.115215 kernel: acpiphp: Slot [3] registered Dec 13 02:20:36.115231 kernel: acpiphp: Slot [4] registered Dec 13 02:20:36.115246 kernel: acpiphp: Slot [5] registered Dec 13 02:20:36.115260 kernel: acpiphp: Slot [6] registered Dec 13 02:20:36.115275 kernel: acpiphp: Slot [7] registered Dec 13 02:20:36.115289 kernel: acpiphp: Slot [8] registered Dec 13 02:20:36.115303 kernel: acpiphp: Slot [9] registered Dec 13 02:20:36.115318 kernel: acpiphp: Slot [10] registered Dec 13 02:20:36.115332 kernel: acpiphp: Slot [11] registered Dec 13 02:20:36.115350 kernel: acpiphp: Slot [12] registered Dec 13 02:20:36.115365 kernel: acpiphp: Slot [13] registered Dec 13 02:20:36.115380 kernel: acpiphp: Slot [14] registered Dec 13 02:20:36.115394 kernel: acpiphp: Slot [15] registered Dec 13 02:20:36.115409 kernel: acpiphp: Slot [16] registered Dec 13 02:20:36.115424 kernel: acpiphp: Slot [17] registered Dec 13 02:20:36.115438 kernel: acpiphp: Slot [18] registered Dec 13 02:20:36.115452 kernel: acpiphp: Slot [19] registered Dec 13 02:20:36.115467 kernel: acpiphp: Slot [20] registered Dec 13 02:20:36.115484 kernel: acpiphp: Slot [21] registered Dec 13 02:20:36.115498 kernel: acpiphp: Slot [22] registered Dec 13 02:20:36.115513 kernel: acpiphp: Slot [23] registered Dec 13 02:20:36.115527 kernel: acpiphp: Slot [24] registered Dec 13 02:20:36.115540 kernel: acpiphp: Slot [25] registered Dec 13 02:20:36.115555 kernel: acpiphp: Slot [26] registered Dec 13 02:20:36.115708 kernel: acpiphp: Slot [27] registered Dec 13 02:20:36.115726 kernel: acpiphp: Slot [28] registered Dec 13 02:20:36.115740 kernel: acpiphp: Slot [29] registered Dec 13 02:20:36.115755 kernel: acpiphp: Slot [30] registered Dec 13 02:20:36.115774 kernel: acpiphp: Slot [31] registered Dec 13 02:20:36.115788 kernel: PCI host bridge to bus 0000:00 Dec 13 02:20:36.116150 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:20:36.116276 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:20:36.116389 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:20:36.116501 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 02:20:36.116614 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 02:20:36.116789 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 02:20:36.116928 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 02:20:36.117064 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Dec 13 02:20:36.117194 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 02:20:36.117473 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Dec 13 02:20:36.117609 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Dec 13 02:20:36.117754 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Dec 13 02:20:36.117889 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Dec 13 02:20:36.118019 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Dec 13 02:20:36.118149 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Dec 13 02:20:36.118277 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Dec 13 02:20:36.118404 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 10742 usecs Dec 13 02:20:36.118541 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Dec 13 02:20:36.118688 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Dec 13 02:20:36.118812 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Dec 13 02:20:36.118957 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 02:20:36.119101 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 02:20:36.119220 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Dec 13 02:20:36.119351 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 02:20:36.119465 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Dec 13 02:20:36.119486 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 02:20:36.119499 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 02:20:36.119512 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:20:36.119525 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 02:20:36.119537 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 02:20:36.119549 kernel: iommu: Default domain type: Translated Dec 13 02:20:36.119561 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:20:36.119695 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Dec 13 02:20:36.119808 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 02:20:36.119931 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Dec 13 02:20:36.119947 kernel: vgaarb: loaded Dec 13 02:20:36.119960 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:20:36.119972 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:20:36.119984 kernel: PTP clock support registered Dec 13 02:20:36.119996 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:20:36.120009 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:20:36.120023 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 02:20:36.120039 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Dec 13 02:20:36.120051 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Dec 13 02:20:36.120064 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Dec 13 02:20:36.120077 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 02:20:36.120089 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:20:36.120101 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:20:36.120114 kernel: pnp: PnP ACPI init Dec 13 02:20:36.120127 kernel: pnp: PnP ACPI: found 5 devices Dec 13 02:20:36.120140 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:20:36.120156 kernel: NET: Registered PF_INET protocol family Dec 13 02:20:36.120168 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 02:20:36.120182 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 02:20:36.120195 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:20:36.120206 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:20:36.120218 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 02:20:36.120229 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 02:20:36.120242 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:20:36.120254 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:20:36.120270 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:20:36.120283 kernel: NET: Registered PF_XDP protocol family Dec 13 02:20:36.121316 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:20:36.121457 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:20:36.121785 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:20:36.121933 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 02:20:36.122084 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:20:36.122227 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 02:20:36.122253 kernel: PCI: CLS 0 bytes, default 64 Dec 13 02:20:36.122269 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:20:36.122285 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns Dec 13 02:20:36.122301 kernel: clocksource: Switched to clocksource tsc Dec 13 02:20:36.122318 kernel: Initialise system trusted keyrings Dec 13 02:20:36.122332 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 02:20:36.122348 kernel: Key type asymmetric registered Dec 13 02:20:36.122363 kernel: Asymmetric key parser 'x509' registered Dec 13 02:20:36.122381 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:20:36.122397 kernel: io scheduler mq-deadline registered Dec 13 02:20:36.122413 kernel: io scheduler kyber registered Dec 13 02:20:36.122428 kernel: io scheduler bfq registered Dec 13 02:20:36.122444 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:20:36.122459 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:20:36.122474 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:20:36.122489 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 02:20:36.122504 kernel: i8042: Warning: Keylock active Dec 13 02:20:36.122523 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:20:36.122538 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:20:36.122705 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 02:20:36.122835 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 02:20:36.123081 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T02:20:35 UTC (1734056435) Dec 13 02:20:36.123202 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 02:20:36.123220 kernel: intel_pstate: CPU model not supported Dec 13 02:20:36.123236 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:20:36.123255 kernel: Segment Routing with IPv6 Dec 13 02:20:36.123270 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:20:36.123286 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:20:36.123302 kernel: Key type dns_resolver registered Dec 13 02:20:36.123317 kernel: IPI shorthand broadcast: enabled Dec 13 02:20:36.123333 kernel: sched_clock: Marking stable (459050801, 293523385)->(884968058, -132393872) Dec 13 02:20:36.123349 kernel: registered taskstats version 1 Dec 13 02:20:36.123366 kernel: Loading compiled-in X.509 certificates Dec 13 02:20:36.123381 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:20:36.123401 kernel: Key type .fscrypt registered Dec 13 02:20:36.123416 kernel: Key type fscrypt-provisioning registered Dec 13 02:20:36.123433 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 02:20:36.123448 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:20:36.123463 kernel: ima: No architecture policies found Dec 13 02:20:36.123478 kernel: clk: Disabling unused clocks Dec 13 02:20:36.123494 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:20:36.123510 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:20:36.123526 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:20:36.123544 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:20:36.123559 kernel: Run /init as init process Dec 13 02:20:36.123703 kernel: with arguments: Dec 13 02:20:36.123722 kernel: /init Dec 13 02:20:36.123735 kernel: with environment: Dec 13 02:20:36.123747 kernel: HOME=/ Dec 13 02:20:36.123760 kernel: TERM=linux Dec 13 02:20:36.123772 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:20:36.123863 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:20:36.123887 systemd[1]: Detected virtualization amazon. Dec 13 02:20:36.123903 systemd[1]: Detected architecture x86-64. Dec 13 02:20:36.123919 systemd[1]: Running in initrd. Dec 13 02:20:36.123957 systemd[1]: No hostname configured, using default hostname. Dec 13 02:20:36.123975 systemd[1]: Hostname set to . Dec 13 02:20:36.123993 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:20:36.124007 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:20:36.124022 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:20:36.124036 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:20:36.124050 systemd[1]: Reached target cryptsetup.target. Dec 13 02:20:36.124064 systemd[1]: Reached target paths.target. Dec 13 02:20:36.124117 systemd[1]: Reached target slices.target. Dec 13 02:20:36.124135 systemd[1]: Reached target swap.target. Dec 13 02:20:36.124152 systemd[1]: Reached target timers.target. Dec 13 02:20:36.124168 systemd[1]: Listening on iscsid.socket. Dec 13 02:20:36.124182 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:20:36.124196 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:20:36.124211 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:20:36.124226 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:20:36.124241 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:20:36.124256 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:20:36.124274 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:20:36.124290 systemd[1]: Reached target sockets.target. Dec 13 02:20:36.124305 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:20:36.124320 systemd[1]: Finished network-cleanup.service. Dec 13 02:20:36.124335 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:20:36.124349 systemd[1]: Starting systemd-journald.service... Dec 13 02:20:36.124365 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:20:36.124379 systemd[1]: Starting systemd-resolved.service... Dec 13 02:20:36.124395 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:20:36.124422 systemd-journald[185]: Journal started Dec 13 02:20:36.124556 systemd-journald[185]: Runtime Journal (/run/log/journal/ec217ce08aa7d9e41116fbf0be828de3) is 4.8M, max 38.7M, 33.9M free. Dec 13 02:20:36.133680 systemd[1]: Started systemd-journald.service. Dec 13 02:20:36.135066 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 02:20:36.373101 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:20:36.373141 kernel: Bridge firewalling registered Dec 13 02:20:36.373160 kernel: SCSI subsystem initialized Dec 13 02:20:36.373181 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:20:36.373201 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:20:36.373218 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:20:36.373237 kernel: audit: type=1130 audit(1734056436.361:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.373254 kernel: audit: type=1130 audit(1734056436.369:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.195007 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 02:20:36.216149 systemd-resolved[187]: Positive Trust Anchors: Dec 13 02:20:36.392620 kernel: audit: type=1130 audit(1734056436.383:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.216169 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:20:36.216221 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:20:36.421802 kernel: audit: type=1130 audit(1734056436.400:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.229803 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 13 02:20:36.256174 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 02:20:36.363328 systemd[1]: Started systemd-resolved.service. Dec 13 02:20:36.371882 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:20:36.385568 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:20:36.421944 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:20:36.428393 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:20:36.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.440730 kernel: audit: type=1130 audit(1734056436.427:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.449282 systemd[1]: Reached target nss-lookup.target. Dec 13 02:20:36.457478 kernel: audit: type=1130 audit(1734056436.447:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.458786 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:20:36.460706 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:20:36.461563 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:20:36.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.492725 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:20:36.513239 kernel: audit: type=1130 audit(1734056436.493:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.513296 kernel: audit: type=1130 audit(1734056436.507:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.498296 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:20:36.515519 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:20:36.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.524241 kernel: audit: type=1130 audit(1734056436.516:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.522080 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:20:36.534861 dracut-cmdline[206]: dracut-dracut-053 Dec 13 02:20:36.537520 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:20:36.611684 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:20:36.631699 kernel: iscsi: registered transport (tcp) Dec 13 02:20:36.660096 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:20:36.660185 kernel: QLogic iSCSI HBA Driver Dec 13 02:20:36.698688 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:20:36.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:36.701944 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:20:36.803716 kernel: raid6: avx512x4 gen() 13259 MB/s Dec 13 02:20:36.821709 kernel: raid6: avx512x4 xor() 4936 MB/s Dec 13 02:20:36.839794 kernel: raid6: avx512x2 gen() 10199 MB/s Dec 13 02:20:36.857709 kernel: raid6: avx512x2 xor() 13829 MB/s Dec 13 02:20:36.874711 kernel: raid6: avx512x1 gen() 9388 MB/s Dec 13 02:20:36.891713 kernel: raid6: avx512x1 xor() 18169 MB/s Dec 13 02:20:36.908710 kernel: raid6: avx2x4 gen() 12966 MB/s Dec 13 02:20:36.925713 kernel: raid6: avx2x4 xor() 5720 MB/s Dec 13 02:20:36.942718 kernel: raid6: avx2x2 gen() 14841 MB/s Dec 13 02:20:36.959715 kernel: raid6: avx2x2 xor() 15229 MB/s Dec 13 02:20:36.976716 kernel: raid6: avx2x1 gen() 9536 MB/s Dec 13 02:20:36.994712 kernel: raid6: avx2x1 xor() 11036 MB/s Dec 13 02:20:37.011733 kernel: raid6: sse2x4 gen() 6761 MB/s Dec 13 02:20:37.028717 kernel: raid6: sse2x4 xor() 4477 MB/s Dec 13 02:20:37.045719 kernel: raid6: sse2x2 gen() 7794 MB/s Dec 13 02:20:37.062716 kernel: raid6: sse2x2 xor() 4864 MB/s Dec 13 02:20:37.079715 kernel: raid6: sse2x1 gen() 7790 MB/s Dec 13 02:20:37.096715 kernel: raid6: sse2x1 xor() 3952 MB/s Dec 13 02:20:37.096889 kernel: raid6: using algorithm avx2x2 gen() 14841 MB/s Dec 13 02:20:37.098887 kernel: raid6: .... xor() 15229 MB/s, rmw enabled Dec 13 02:20:37.098932 kernel: raid6: using avx512x2 recovery algorithm Dec 13 02:20:37.115681 kernel: xor: automatically using best checksumming function avx Dec 13 02:20:37.314342 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:20:37.352945 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:20:37.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:37.353000 audit: BPF prog-id=7 op=LOAD Dec 13 02:20:37.353000 audit: BPF prog-id=8 op=LOAD Dec 13 02:20:37.356087 systemd[1]: Starting systemd-udevd.service... Dec 13 02:20:37.376474 systemd-udevd[383]: Using default interface naming scheme 'v252'. Dec 13 02:20:37.384483 systemd[1]: Started systemd-udevd.service. Dec 13 02:20:37.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:37.388557 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:20:37.431269 dracut-pre-trigger[390]: rd.md=0: removing MD RAID activation Dec 13 02:20:37.474801 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:20:37.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:37.477573 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:20:37.531136 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:20:37.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:37.621677 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:20:37.647146 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:20:37.647229 kernel: AES CTR mode by8 optimization enabled Dec 13 02:20:37.663043 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 02:20:37.690011 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 02:20:37.690188 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 02:20:37.690357 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 02:20:37.690380 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Dec 13 02:20:37.690523 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 02:20:37.690903 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:9f:cd:8e:ed:e3 Dec 13 02:20:37.691131 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:20:37.691152 kernel: GPT:9289727 != 16777215 Dec 13 02:20:37.691166 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:20:37.691182 kernel: GPT:9289727 != 16777215 Dec 13 02:20:37.691203 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:20:37.691221 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 02:20:37.693257 (udev-worker)[438]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:20:37.863580 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (430) Dec 13 02:20:37.860912 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:20:37.914326 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:20:37.917575 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:20:37.932826 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:20:37.938221 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:20:37.944627 systemd[1]: Starting disk-uuid.service... Dec 13 02:20:37.954494 disk-uuid[593]: Primary Header is updated. Dec 13 02:20:37.954494 disk-uuid[593]: Secondary Entries is updated. Dec 13 02:20:37.954494 disk-uuid[593]: Secondary Header is updated. Dec 13 02:20:37.961681 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 02:20:37.966680 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 02:20:37.973686 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 02:20:38.974735 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 02:20:38.977285 disk-uuid[594]: The operation has completed successfully. Dec 13 02:20:39.132609 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:20:39.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:39.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:39.132738 systemd[1]: Finished disk-uuid.service. Dec 13 02:20:39.140760 systemd[1]: Starting verity-setup.service... Dec 13 02:20:39.165682 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:20:39.274000 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:20:39.277543 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:20:39.288116 systemd[1]: Finished verity-setup.service. Dec 13 02:20:39.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:39.415686 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:20:39.418917 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:20:39.420642 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:20:39.423269 systemd[1]: Starting ignition-setup.service... Dec 13 02:20:39.425263 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:20:39.473678 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:20:39.473770 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 02:20:39.473790 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 02:20:39.489685 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 02:20:39.509150 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:20:39.533279 systemd[1]: Finished ignition-setup.service. Dec 13 02:20:39.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:39.536437 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:20:39.568386 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:20:39.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:39.569000 audit: BPF prog-id=9 op=LOAD Dec 13 02:20:39.571541 systemd[1]: Starting systemd-networkd.service... Dec 13 02:20:39.610799 systemd-networkd[1117]: lo: Link UP Dec 13 02:20:39.610811 systemd-networkd[1117]: lo: Gained carrier Dec 13 02:20:39.611692 systemd-networkd[1117]: Enumeration completed Dec 13 02:20:39.611955 systemd-networkd[1117]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:20:39.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:39.612486 systemd[1]: Started systemd-networkd.service. Dec 13 02:20:39.618767 systemd[1]: Reached target network.target. Dec 13 02:20:39.622550 systemd[1]: Starting iscsiuio.service... Dec 13 02:20:39.633402 systemd-networkd[1117]: eth0: Link UP Dec 13 02:20:39.633413 systemd-networkd[1117]: eth0: Gained carrier Dec 13 02:20:39.637451 systemd[1]: Started iscsiuio.service. Dec 13 02:20:39.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:39.640010 systemd[1]: Starting iscsid.service... Dec 13 02:20:39.648828 iscsid[1123]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:20:39.648828 iscsid[1123]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:20:39.648828 iscsid[1123]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:20:39.648828 iscsid[1123]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:20:39.648828 iscsid[1123]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:20:39.659469 iscsid[1123]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:20:39.655966 systemd[1]: Started iscsid.service. Dec 13 02:20:39.661144 systemd-networkd[1117]: eth0: DHCPv4 address 172.31.18.8/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 02:20:39.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:39.665974 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:20:39.686388 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:20:39.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:39.688228 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:20:39.690029 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:20:39.691867 systemd[1]: Reached target remote-fs.target. Dec 13 02:20:39.695755 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:20:39.712735 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:20:39.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.206373 ignition[1087]: Ignition 2.14.0 Dec 13 02:20:40.206389 ignition[1087]: Stage: fetch-offline Dec 13 02:20:40.206639 ignition[1087]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:20:40.206702 ignition[1087]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:20:40.225394 ignition[1087]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:20:40.229206 ignition[1087]: Ignition finished successfully Dec 13 02:20:40.231429 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:20:40.239282 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 02:20:40.239357 kernel: audit: type=1130 audit(1734056440.231:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.234174 systemd[1]: Starting ignition-fetch.service... Dec 13 02:20:40.249011 ignition[1142]: Ignition 2.14.0 Dec 13 02:20:40.249025 ignition[1142]: Stage: fetch Dec 13 02:20:40.249246 ignition[1142]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:20:40.249280 ignition[1142]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:20:40.257889 ignition[1142]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:20:40.259225 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:20:40.273387 ignition[1142]: INFO : PUT result: OK Dec 13 02:20:40.278539 ignition[1142]: DEBUG : parsed url from cmdline: "" Dec 13 02:20:40.278539 ignition[1142]: INFO : no config URL provided Dec 13 02:20:40.278539 ignition[1142]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:20:40.278539 ignition[1142]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 02:20:40.290567 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:20:40.290567 ignition[1142]: INFO : PUT result: OK Dec 13 02:20:40.290567 ignition[1142]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 02:20:40.303119 ignition[1142]: INFO : GET result: OK Dec 13 02:20:40.303119 ignition[1142]: DEBUG : parsing config with SHA512: ecdc89f5f4b93b73dc602d0f1818eff36793c5e414fe03e7d39f530879ada2ee2c8c0613de47cb33a77d33ddcbbda7b30b0389aafba37e215f11345a73de42fd Dec 13 02:20:40.333918 unknown[1142]: fetched base config from "system" Dec 13 02:20:40.333934 unknown[1142]: fetched base config from "system" Dec 13 02:20:40.333977 unknown[1142]: fetched user config from "aws" Dec 13 02:20:40.344823 ignition[1142]: fetch: fetch complete Dec 13 02:20:40.345127 ignition[1142]: fetch: fetch passed Dec 13 02:20:40.345285 ignition[1142]: Ignition finished successfully Dec 13 02:20:40.360596 systemd[1]: Finished ignition-fetch.service. Dec 13 02:20:40.362904 systemd[1]: Starting ignition-kargs.service... Dec 13 02:20:40.371805 kernel: audit: type=1130 audit(1734056440.359:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.385814 ignition[1148]: Ignition 2.14.0 Dec 13 02:20:40.385828 ignition[1148]: Stage: kargs Dec 13 02:20:40.386059 ignition[1148]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:20:40.386091 ignition[1148]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:20:40.399011 ignition[1148]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:20:40.401019 ignition[1148]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:20:40.402677 ignition[1148]: INFO : PUT result: OK Dec 13 02:20:40.410710 ignition[1148]: kargs: kargs passed Dec 13 02:20:40.410811 ignition[1148]: Ignition finished successfully Dec 13 02:20:40.412821 systemd[1]: Finished ignition-kargs.service. Dec 13 02:20:40.415193 systemd[1]: Starting ignition-disks.service... Dec 13 02:20:40.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.423685 kernel: audit: type=1130 audit(1734056440.411:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.429281 ignition[1154]: Ignition 2.14.0 Dec 13 02:20:40.429293 ignition[1154]: Stage: disks Dec 13 02:20:40.429513 ignition[1154]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:20:40.429550 ignition[1154]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:20:40.441203 ignition[1154]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:20:40.442746 ignition[1154]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:20:40.444124 ignition[1154]: INFO : PUT result: OK Dec 13 02:20:40.447397 ignition[1154]: disks: disks passed Dec 13 02:20:40.447467 ignition[1154]: Ignition finished successfully Dec 13 02:20:40.450694 systemd[1]: Finished ignition-disks.service. Dec 13 02:20:40.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.452565 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:20:40.457743 kernel: audit: type=1130 audit(1734056440.450:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.456029 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:20:40.458779 systemd[1]: Reached target local-fs.target. Dec 13 02:20:40.460604 systemd[1]: Reached target sysinit.target. Dec 13 02:20:40.462313 systemd[1]: Reached target basic.target. Dec 13 02:20:40.465153 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:20:40.506495 systemd-fsck[1162]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 02:20:40.512817 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:20:40.515552 systemd[1]: Mounting sysroot.mount... Dec 13 02:20:40.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.524679 kernel: audit: type=1130 audit(1734056440.512:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.546758 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:20:40.550782 systemd[1]: Mounted sysroot.mount. Dec 13 02:20:40.552289 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:20:40.570565 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:20:40.573139 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:20:40.573220 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:20:40.573260 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:20:40.605180 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:20:40.620354 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:20:40.623283 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:20:40.636037 initrd-setup-root[1184]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:20:40.648314 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1179) Dec 13 02:20:40.652994 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:20:40.653075 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 02:20:40.653119 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 02:20:40.656705 initrd-setup-root[1200]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:20:40.663706 initrd-setup-root[1216]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:20:40.669818 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 02:20:40.675992 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:20:40.677240 initrd-setup-root[1226]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:20:40.930775 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:20:40.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.933429 systemd[1]: Starting ignition-mount.service... Dec 13 02:20:40.940586 kernel: audit: type=1130 audit(1734056440.931:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.941730 systemd[1]: Starting sysroot-boot.service... Dec 13 02:20:40.948869 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 02:20:40.949002 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 02:20:40.964503 ignition[1244]: INFO : Ignition 2.14.0 Dec 13 02:20:40.965847 ignition[1244]: INFO : Stage: mount Dec 13 02:20:40.965847 ignition[1244]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:20:40.965847 ignition[1244]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:20:40.972126 systemd-networkd[1117]: eth0: Gained IPv6LL Dec 13 02:20:40.977676 ignition[1244]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:20:40.979412 ignition[1244]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:20:40.984254 ignition[1244]: INFO : PUT result: OK Dec 13 02:20:40.987813 ignition[1244]: INFO : mount: mount passed Dec 13 02:20:40.989940 ignition[1244]: INFO : Ignition finished successfully Dec 13 02:20:40.989033 systemd[1]: Finished ignition-mount.service. Dec 13 02:20:40.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.995765 kernel: audit: type=1130 audit(1734056440.989:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.992857 systemd[1]: Finished sysroot-boot.service. Dec 13 02:20:41.002227 kernel: audit: type=1130 audit(1734056440.994:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:40.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:41.003206 systemd[1]: Starting ignition-files.service... Dec 13 02:20:41.016629 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:20:41.031679 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1254) Dec 13 02:20:41.033892 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:20:41.033935 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 02:20:41.033953 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 02:20:41.040678 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 02:20:41.043376 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:20:41.061968 ignition[1273]: INFO : Ignition 2.14.0 Dec 13 02:20:41.061968 ignition[1273]: INFO : Stage: files Dec 13 02:20:41.064832 ignition[1273]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:20:41.064832 ignition[1273]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:20:41.082495 ignition[1273]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:20:41.084698 ignition[1273]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:20:41.087566 ignition[1273]: INFO : PUT result: OK Dec 13 02:20:41.093032 ignition[1273]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:20:41.097307 ignition[1273]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:20:41.097307 ignition[1273]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:20:41.118319 ignition[1273]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:20:41.121112 ignition[1273]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:20:41.123983 unknown[1273]: wrote ssh authorized keys file for user: core Dec 13 02:20:41.125464 ignition[1273]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:20:41.130369 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:20:41.132998 ignition[1273]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 02:20:41.251302 ignition[1273]: INFO : GET result: OK Dec 13 02:20:41.488848 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:20:41.493563 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 02:20:41.493563 ignition[1273]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:20:41.522789 ignition[1273]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem533501489" Dec 13 02:20:41.531770 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1278) Dec 13 02:20:41.531941 ignition[1273]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem533501489": device or resource busy Dec 13 02:20:41.531941 ignition[1273]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem533501489", trying btrfs: device or resource busy Dec 13 02:20:41.531941 ignition[1273]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem533501489" Dec 13 02:20:41.531941 ignition[1273]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem533501489" Dec 13 02:20:41.540353 ignition[1273]: INFO : op(3): [started] unmounting "/mnt/oem533501489" Dec 13 02:20:41.540353 ignition[1273]: INFO : op(3): [finished] unmounting "/mnt/oem533501489" Dec 13 02:20:41.540353 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 02:20:41.540353 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:20:41.547764 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:20:41.547764 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:20:41.547764 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:20:41.547764 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:20:41.547764 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:20:41.547764 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:20:41.547764 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:20:41.563106 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:20:41.563106 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:20:41.563106 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:20:41.563106 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:20:41.563106 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 02:20:41.563106 ignition[1273]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:20:41.581308 ignition[1273]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2748318525" Dec 13 02:20:41.583410 ignition[1273]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2748318525": device or resource busy Dec 13 02:20:41.583410 ignition[1273]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2748318525", trying btrfs: device or resource busy Dec 13 02:20:41.583410 ignition[1273]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2748318525" Dec 13 02:20:41.591566 ignition[1273]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2748318525" Dec 13 02:20:41.591566 ignition[1273]: INFO : op(6): [started] unmounting "/mnt/oem2748318525" Dec 13 02:20:41.591566 ignition[1273]: INFO : op(6): [finished] unmounting "/mnt/oem2748318525" Dec 13 02:20:41.591566 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 02:20:41.591566 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 02:20:41.591566 ignition[1273]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:20:41.614201 ignition[1273]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2864423663" Dec 13 02:20:41.614201 ignition[1273]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2864423663": device or resource busy Dec 13 02:20:41.614201 ignition[1273]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2864423663", trying btrfs: device or resource busy Dec 13 02:20:41.614201 ignition[1273]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2864423663" Dec 13 02:20:41.629349 ignition[1273]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2864423663" Dec 13 02:20:41.629349 ignition[1273]: INFO : op(9): [started] unmounting "/mnt/oem2864423663" Dec 13 02:20:41.629349 ignition[1273]: INFO : op(9): [finished] unmounting "/mnt/oem2864423663" Dec 13 02:20:41.629349 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 02:20:41.629349 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 02:20:41.629349 ignition[1273]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:20:41.647784 systemd[1]: mnt-oem2864423663.mount: Deactivated successfully. Dec 13 02:20:41.673456 ignition[1273]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1853233287" Dec 13 02:20:41.675120 ignition[1273]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1853233287": device or resource busy Dec 13 02:20:41.675120 ignition[1273]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1853233287", trying btrfs: device or resource busy Dec 13 02:20:41.675120 ignition[1273]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1853233287" Dec 13 02:20:41.675120 ignition[1273]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1853233287" Dec 13 02:20:41.682817 ignition[1273]: INFO : op(c): [started] unmounting "/mnt/oem1853233287" Dec 13 02:20:41.685883 ignition[1273]: INFO : op(c): [finished] unmounting "/mnt/oem1853233287" Dec 13 02:20:41.687244 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 02:20:41.689137 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:20:41.694755 ignition[1273]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 02:20:42.168026 ignition[1273]: INFO : GET result: OK Dec 13 02:20:42.552528 systemd[1]: mnt-oem1853233287.mount: Deactivated successfully. Dec 13 02:20:42.665871 ignition[1273]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(12): [started] processing unit "nvidia.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(12): [finished] processing unit "nvidia.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(16): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(16): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Dec 13 02:20:42.668845 ignition[1273]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 02:20:42.718196 kernel: audit: type=1130 audit(1734056442.705:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.718287 ignition[1273]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:20:42.718287 ignition[1273]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:20:42.718287 ignition[1273]: INFO : files: files passed Dec 13 02:20:42.718287 ignition[1273]: INFO : Ignition finished successfully Dec 13 02:20:42.688951 systemd[1]: Finished ignition-files.service. Dec 13 02:20:42.727778 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:20:42.729165 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:20:42.730310 systemd[1]: Starting ignition-quench.service... Dec 13 02:20:42.738528 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:20:42.743625 systemd[1]: Finished ignition-quench.service. Dec 13 02:20:42.750006 kernel: audit: type=1130 audit(1734056442.743:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.764581 initrd-setup-root-after-ignition[1298]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:20:42.766879 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:20:42.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.767179 systemd[1]: Reached target ignition-complete.target. Dec 13 02:20:42.774924 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:20:42.838825 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:20:42.839313 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:20:42.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.842976 systemd[1]: Reached target initrd-fs.target. Dec 13 02:20:42.845483 systemd[1]: Reached target initrd.target. Dec 13 02:20:42.846497 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:20:42.847713 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:20:42.863377 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:20:42.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.864788 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:20:42.884206 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:20:42.884513 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:20:42.891324 systemd[1]: Stopped target timers.target. Dec 13 02:20:42.894107 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:20:42.895637 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:20:42.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.897569 systemd[1]: Stopped target initrd.target. Dec 13 02:20:42.899176 systemd[1]: Stopped target basic.target. Dec 13 02:20:42.900772 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:20:42.904232 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:20:42.907534 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:20:42.908012 systemd[1]: Stopped target remote-fs.target. Dec 13 02:20:42.911593 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:20:42.913785 systemd[1]: Stopped target sysinit.target. Dec 13 02:20:42.915857 systemd[1]: Stopped target local-fs.target. Dec 13 02:20:42.917581 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:20:42.919447 systemd[1]: Stopped target swap.target. Dec 13 02:20:42.923453 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:20:42.938534 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:20:42.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.940730 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:20:42.946496 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:20:42.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.946628 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:20:42.951024 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:20:42.951181 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:20:42.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.955836 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:20:42.957984 systemd[1]: Stopped ignition-files.service. Dec 13 02:20:42.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.962765 systemd[1]: Stopping ignition-mount.service... Dec 13 02:20:42.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:42.970898 iscsid[1123]: iscsid shutting down. Dec 13 02:20:42.963987 systemd[1]: Stopping iscsid.service... Dec 13 02:20:42.964709 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:20:42.964832 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:20:42.966963 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:20:42.967773 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:20:42.967900 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:20:42.970230 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:20:42.970338 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:20:42.987403 ignition[1311]: INFO : Ignition 2.14.0 Dec 13 02:20:42.987403 ignition[1311]: INFO : Stage: umount Dec 13 02:20:42.993042 ignition[1311]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:20:42.993042 ignition[1311]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 02:20:42.999870 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:20:42.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.000029 systemd[1]: Stopped iscsid.service. Dec 13 02:20:43.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.003098 systemd[1]: Stopping iscsiuio.service... Dec 13 02:20:43.008333 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:20:43.009304 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:20:43.011407 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:20:43.012355 systemd[1]: Stopped iscsiuio.service. Dec 13 02:20:43.013680 ignition[1311]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 02:20:43.014949 ignition[1311]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 02:20:43.016595 ignition[1311]: INFO : PUT result: OK Dec 13 02:20:43.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.020572 ignition[1311]: INFO : umount: umount passed Dec 13 02:20:43.021520 ignition[1311]: INFO : Ignition finished successfully Dec 13 02:20:43.022403 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:20:43.022674 systemd[1]: Stopped ignition-mount.service. Dec 13 02:20:43.025827 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:20:43.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.025918 systemd[1]: Stopped ignition-disks.service. Dec 13 02:20:43.027032 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:20:43.027131 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:20:43.028698 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 02:20:43.028744 systemd[1]: Stopped ignition-fetch.service. Dec 13 02:20:43.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.035318 systemd[1]: Stopped target network.target. Dec 13 02:20:43.036396 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:20:43.036473 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:20:43.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.040010 systemd[1]: Stopped target paths.target. Dec 13 02:20:43.040904 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:20:43.048753 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:20:43.048918 systemd[1]: Stopped target slices.target. Dec 13 02:20:43.052725 systemd[1]: Stopped target sockets.target. Dec 13 02:20:43.054371 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:20:43.054539 systemd[1]: Closed iscsid.socket. Dec 13 02:20:43.057319 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:20:43.057387 systemd[1]: Closed iscsiuio.socket. Dec 13 02:20:43.060451 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:20:43.061583 systemd[1]: Stopped ignition-setup.service. Dec 13 02:20:43.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.063542 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:20:43.065305 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:20:43.067364 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:20:43.067873 systemd-networkd[1117]: eth0: DHCPv6 lease lost Dec 13 02:20:43.072038 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:20:43.073021 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:20:43.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.076200 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:20:43.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.086000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:20:43.076308 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:20:43.087000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:20:43.088038 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:20:43.088614 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:20:43.111701 systemd[1]: Stopping network-cleanup.service... Dec 13 02:20:43.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.114861 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:20:43.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.114962 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:20:43.123815 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:20:43.123905 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:20:43.128880 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:20:43.129089 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:20:43.132439 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:20:43.137433 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:20:43.153065 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:20:43.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.153642 systemd[1]: Stopped network-cleanup.service. Dec 13 02:20:43.162109 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:20:43.163609 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:20:43.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.166095 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:20:43.166293 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:20:43.172033 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:20:43.172093 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:20:43.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.172159 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:20:43.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.172203 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:20:43.179818 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:20:43.179889 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:20:43.183817 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:20:43.183882 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:20:43.189366 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:20:43.198735 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:20:43.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.198858 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:20:43.203955 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:20:43.205185 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:20:43.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.212834 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:20:43.212944 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:20:43.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.217737 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:20:43.220524 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:20:43.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:43.220728 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:20:43.226302 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:20:43.263599 systemd[1]: Switching root. Dec 13 02:20:43.334259 systemd-journald[185]: Journal stopped Dec 13 02:20:49.337401 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Dec 13 02:20:49.337554 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:20:49.337851 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:20:49.337945 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:20:49.337974 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:20:49.337990 kernel: SELinux: policy capability open_perms=1 Dec 13 02:20:49.338012 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:20:49.338029 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:20:49.338046 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:20:49.338237 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:20:49.338258 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:20:49.338310 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:20:49.338330 systemd[1]: Successfully loaded SELinux policy in 94.572ms. Dec 13 02:20:49.338362 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.070ms. Dec 13 02:20:49.338383 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:20:49.338403 systemd[1]: Detected virtualization amazon. Dec 13 02:20:49.338421 systemd[1]: Detected architecture x86-64. Dec 13 02:20:49.338439 systemd[1]: Detected first boot. Dec 13 02:20:49.338456 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:20:49.338474 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:20:49.338495 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:20:49.338514 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:20:49.338533 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:20:49.338553 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:20:49.338572 kernel: kauditd_printk_skb: 56 callbacks suppressed Dec 13 02:20:49.338590 kernel: audit: type=1334 audit(1734056448.967:88): prog-id=12 op=LOAD Dec 13 02:20:49.338610 kernel: audit: type=1334 audit(1734056448.967:89): prog-id=3 op=UNLOAD Dec 13 02:20:49.338627 kernel: audit: type=1334 audit(1734056448.968:90): prog-id=13 op=LOAD Dec 13 02:20:49.338643 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:20:49.338701 kernel: audit: type=1334 audit(1734056448.969:91): prog-id=14 op=LOAD Dec 13 02:20:49.338720 kernel: audit: type=1334 audit(1734056448.969:92): prog-id=4 op=UNLOAD Dec 13 02:20:49.338736 kernel: audit: type=1334 audit(1734056448.969:93): prog-id=5 op=UNLOAD Dec 13 02:20:49.338752 kernel: audit: type=1131 audit(1734056448.970:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.338771 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:20:49.338788 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:20:49.338805 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:20:49.338823 kernel: audit: type=1334 audit(1734056448.981:95): prog-id=12 op=UNLOAD Dec 13 02:20:49.339113 kernel: audit: type=1130 audit(1734056448.981:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.339142 kernel: audit: type=1131 audit(1734056448.981:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.339161 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:20:49.339183 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 02:20:49.339206 systemd[1]: Created slice system-getty.slice. Dec 13 02:20:49.339224 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:20:49.339241 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:20:49.339259 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:20:49.339277 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:20:49.339298 systemd[1]: Created slice user.slice. Dec 13 02:20:49.339316 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:20:49.339333 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:20:49.339353 systemd[1]: Set up automount boot.automount. Dec 13 02:20:49.339371 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:20:49.339389 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:20:49.339407 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:20:49.339426 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:20:49.339444 systemd[1]: Reached target integritysetup.target. Dec 13 02:20:49.339462 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:20:49.339479 systemd[1]: Reached target remote-fs.target. Dec 13 02:20:49.339497 systemd[1]: Reached target slices.target. Dec 13 02:20:49.339517 systemd[1]: Reached target swap.target. Dec 13 02:20:49.339534 systemd[1]: Reached target torcx.target. Dec 13 02:20:49.339551 systemd[1]: Reached target veritysetup.target. Dec 13 02:20:49.339568 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:20:49.339585 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:20:49.339603 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:20:49.339621 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:20:49.339718 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:20:49.339737 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:20:49.339758 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:20:49.339779 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:20:49.339798 systemd[1]: Mounting media.mount... Dec 13 02:20:49.339816 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:20:49.339834 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:20:49.339851 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:20:49.339869 systemd[1]: Mounting tmp.mount... Dec 13 02:20:49.339886 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:20:49.339976 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:20:49.339998 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:20:49.340020 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:20:49.340039 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:20:49.340058 systemd[1]: Starting modprobe@drm.service... Dec 13 02:20:49.340075 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:20:49.340092 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:20:49.340118 systemd[1]: Starting modprobe@loop.service... Dec 13 02:20:49.340135 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:20:49.340159 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:20:49.340187 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:20:49.340207 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:20:49.340224 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:20:49.340244 systemd[1]: Stopped systemd-journald.service. Dec 13 02:20:49.340277 systemd[1]: Starting systemd-journald.service... Dec 13 02:20:49.340299 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:20:49.340316 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:20:49.340333 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:20:49.340350 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:20:49.340368 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:20:49.340386 systemd[1]: Stopped verity-setup.service. Dec 13 02:20:49.340406 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:20:49.340427 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:20:49.340446 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:20:49.340470 systemd[1]: Mounted media.mount. Dec 13 02:20:49.340489 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:20:49.340508 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:20:49.340527 systemd[1]: Mounted tmp.mount. Dec 13 02:20:49.340547 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:20:49.340568 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:20:49.340815 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:20:49.340894 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:20:49.340915 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:20:49.340938 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:20:49.340959 systemd[1]: Finished modprobe@drm.service. Dec 13 02:20:49.340978 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:20:49.340997 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:20:49.341015 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:20:49.341038 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:20:49.341064 systemd-journald[1416]: Journal started Dec 13 02:20:49.341142 systemd-journald[1416]: Runtime Journal (/run/log/journal/ec217ce08aa7d9e41116fbf0be828de3) is 4.8M, max 38.7M, 33.9M free. Dec 13 02:20:43.870000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:20:44.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:20:44.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:20:44.005000 audit: BPF prog-id=10 op=LOAD Dec 13 02:20:44.005000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:20:44.005000 audit: BPF prog-id=11 op=LOAD Dec 13 02:20:44.005000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:20:44.278000 audit[1345]: AVC avc: denied { associate } for pid=1345 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:20:44.278000 audit[1345]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=1328 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:20:44.278000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:20:44.282000 audit[1345]: AVC avc: denied { associate } for pid=1345 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:20:44.282000 audit[1345]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059b9 a2=1ed a3=0 items=2 ppid=1328 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:20:44.282000 audit: CWD cwd="/" Dec 13 02:20:44.282000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:44.282000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:44.282000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:20:48.967000 audit: BPF prog-id=12 op=LOAD Dec 13 02:20:48.967000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:20:48.968000 audit: BPF prog-id=13 op=LOAD Dec 13 02:20:48.969000 audit: BPF prog-id=14 op=LOAD Dec 13 02:20:48.969000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:20:48.969000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:20:48.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:48.981000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:20:48.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:48.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.190000 audit: BPF prog-id=15 op=LOAD Dec 13 02:20:49.190000 audit: BPF prog-id=16 op=LOAD Dec 13 02:20:49.190000 audit: BPF prog-id=17 op=LOAD Dec 13 02:20:49.190000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:20:49.190000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:20:49.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.327000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:20:49.327000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc72512c00 a2=4000 a3=7ffc72512c9c items=0 ppid=1 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:20:49.327000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:20:49.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:44.265563 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:20:49.348294 systemd[1]: Started systemd-journald.service. Dec 13 02:20:49.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:48.966548 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:20:44.266242 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:20:48.972035 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:20:44.266275 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:20:49.348188 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:20:44.266324 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:20:44.266342 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:20:49.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:44.266389 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:20:49.350056 systemd[1]: Reached target network-pre.target. Dec 13 02:20:44.266410 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:20:44.266700 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:20:44.266761 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:20:44.266781 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:20:44.278889 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:20:44.278985 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:20:44.279021 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:20:44.279045 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:20:44.279080 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:20:44.279104 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:20:48.367940 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:20:48.368211 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:20:48.368328 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:20:48.368514 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:20:48.368564 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:20:48.368623 /usr/lib/systemd/system-generators/torcx-generator[1345]: time="2024-12-13T02:20:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:20:49.381042 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:20:49.384078 kernel: loop: module loaded Dec 13 02:20:49.383788 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:20:49.400328 kernel: fuse: init (API version 7.34) Dec 13 02:20:49.396737 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:20:49.406179 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:20:49.407196 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:20:49.409051 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:20:49.411425 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:20:49.416366 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:20:49.416558 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:20:49.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.440806 systemd-journald[1416]: Time spent on flushing to /var/log/journal/ec217ce08aa7d9e41116fbf0be828de3 is 88.610ms for 1178 entries. Dec 13 02:20:49.440806 systemd-journald[1416]: System Journal (/var/log/journal/ec217ce08aa7d9e41116fbf0be828de3) is 8.0M, max 195.6M, 187.6M free. Dec 13 02:20:49.561921 systemd-journald[1416]: Received client request to flush runtime journal. Dec 13 02:20:49.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.420202 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:20:49.420394 systemd[1]: Finished modprobe@loop.service. Dec 13 02:20:49.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:49.421482 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:20:49.425001 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:20:49.426841 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:20:49.432242 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:20:49.442444 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:20:49.443615 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:20:49.457791 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:20:49.512468 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:20:49.515191 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:20:49.551630 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:20:49.555556 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:20:49.564111 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:20:49.577161 udevadm[1460]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 02:20:49.632114 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:20:49.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:50.563128 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:20:50.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:50.563000 audit: BPF prog-id=18 op=LOAD Dec 13 02:20:50.563000 audit: BPF prog-id=19 op=LOAD Dec 13 02:20:50.563000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:20:50.563000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:20:50.566999 systemd[1]: Starting systemd-udevd.service... Dec 13 02:20:50.595880 systemd-udevd[1461]: Using default interface naming scheme 'v252'. Dec 13 02:20:50.645316 systemd[1]: Started systemd-udevd.service. Dec 13 02:20:50.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:50.647000 audit: BPF prog-id=20 op=LOAD Dec 13 02:20:50.649961 systemd[1]: Starting systemd-networkd.service... Dec 13 02:20:50.720000 audit: BPF prog-id=21 op=LOAD Dec 13 02:20:50.721000 audit: BPF prog-id=22 op=LOAD Dec 13 02:20:50.721000 audit: BPF prog-id=23 op=LOAD Dec 13 02:20:50.724026 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:20:50.761435 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:20:50.778796 (udev-worker)[1463]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:20:50.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:50.800468 systemd[1]: Started systemd-userdbd.service. Dec 13 02:20:50.849686 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:20:50.860683 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:20:50.864738 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 02:20:50.879717 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 02:20:50.906000 audit[1475]: AVC avc: denied { confidentiality } for pid=1475 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:20:50.906000 audit[1475]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5559881fa890 a1=337fc a2=7f78b0785bc5 a3=5 items=110 ppid=1461 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:20:50.906000 audit: CWD cwd="/" Dec 13 02:20:50.906000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=1 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=2 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=3 name=(null) inode=14185 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=4 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=5 name=(null) inode=14186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=6 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=7 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=8 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=9 name=(null) inode=14188 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=10 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=11 name=(null) inode=14189 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=12 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=13 name=(null) inode=14190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=14 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=15 name=(null) inode=14191 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=16 name=(null) inode=14187 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=17 name=(null) inode=14192 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=18 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=19 name=(null) inode=14193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=20 name=(null) inode=14193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=21 name=(null) inode=14194 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=22 name=(null) inode=14193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=23 name=(null) inode=14195 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=24 name=(null) inode=14193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=25 name=(null) inode=14196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=26 name=(null) inode=14193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=27 name=(null) inode=14197 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=28 name=(null) inode=14193 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=29 name=(null) inode=14198 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=30 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=31 name=(null) inode=14199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=32 name=(null) inode=14199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=33 name=(null) inode=14200 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=34 name=(null) inode=14199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=35 name=(null) inode=14201 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=36 name=(null) inode=14199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=37 name=(null) inode=14202 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=38 name=(null) inode=14199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=39 name=(null) inode=14203 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=40 name=(null) inode=14199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=41 name=(null) inode=14204 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=42 name=(null) inode=14184 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=43 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=44 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=45 name=(null) inode=14206 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=46 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=47 name=(null) inode=14207 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=48 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=49 name=(null) inode=14208 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=50 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=51 name=(null) inode=14209 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=52 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=53 name=(null) inode=14210 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=55 name=(null) inode=14211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=56 name=(null) inode=14211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=57 name=(null) inode=14212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=58 name=(null) inode=14211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=59 name=(null) inode=14213 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=60 name=(null) inode=14211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=61 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=62 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=63 name=(null) inode=14215 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=64 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=65 name=(null) inode=14216 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=66 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=67 name=(null) inode=14217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=68 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=69 name=(null) inode=14218 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=70 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=71 name=(null) inode=14219 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=72 name=(null) inode=14211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=73 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=74 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=75 name=(null) inode=14221 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=76 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=77 name=(null) inode=14222 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=78 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=79 name=(null) inode=14223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=80 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=81 name=(null) inode=14224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=82 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=83 name=(null) inode=14225 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=84 name=(null) inode=14211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=85 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=86 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=87 name=(null) inode=14227 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=88 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=89 name=(null) inode=14228 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=90 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=91 name=(null) inode=14229 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=92 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=93 name=(null) inode=14230 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.924717 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Dec 13 02:20:50.906000 audit: PATH item=94 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=95 name=(null) inode=14231 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=96 name=(null) inode=14211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=97 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=98 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=99 name=(null) inode=14233 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=100 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=101 name=(null) inode=14234 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=102 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=103 name=(null) inode=14235 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=104 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=105 name=(null) inode=14236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=106 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=107 name=(null) inode=14237 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PATH item=109 name=(null) inode=14238 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:20:50.906000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:20:50.965335 systemd-networkd[1470]: lo: Link UP Dec 13 02:20:50.965354 systemd-networkd[1470]: lo: Gained carrier Dec 13 02:20:50.966306 systemd-networkd[1470]: Enumeration completed Dec 13 02:20:50.966454 systemd[1]: Started systemd-networkd.service. Dec 13 02:20:50.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:50.976988 systemd-networkd[1470]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:20:50.979865 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:20:50.984752 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:20:50.985243 systemd-networkd[1470]: eth0: Link UP Dec 13 02:20:50.985454 systemd-networkd[1470]: eth0: Gained carrier Dec 13 02:20:50.998924 systemd-networkd[1470]: eth0: DHCPv4 address 172.31.18.8/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 02:20:51.065914 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 02:20:51.075715 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1473) Dec 13 02:20:51.082690 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:20:51.225747 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:20:51.297319 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:20:51.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.300171 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:20:51.417327 lvm[1575]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:20:51.452244 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:20:51.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.457004 systemd[1]: Reached target cryptsetup.target. Dec 13 02:20:51.459589 systemd[1]: Starting lvm2-activation.service... Dec 13 02:20:51.469436 lvm[1576]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:20:51.494919 systemd[1]: Finished lvm2-activation.service. Dec 13 02:20:51.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.496440 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:20:51.497516 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:20:51.497543 systemd[1]: Reached target local-fs.target. Dec 13 02:20:51.498647 systemd[1]: Reached target machines.target. Dec 13 02:20:51.501153 systemd[1]: Starting ldconfig.service... Dec 13 02:20:51.503056 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:20:51.503147 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:20:51.505247 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:20:51.508076 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:20:51.514751 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:20:51.521228 systemd[1]: Starting systemd-sysext.service... Dec 13 02:20:51.556118 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:20:51.563093 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1578 (bootctl) Dec 13 02:20:51.569228 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:20:51.583716 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:20:51.584009 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:20:51.619273 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:20:51.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.623675 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 02:20:51.781813 systemd-fsck[1589]: fsck.fat 4.2 (2021-01-31) Dec 13 02:20:51.781813 systemd-fsck[1589]: /dev/nvme0n1p1: 789 files, 119291/258078 clusters Dec 13 02:20:51.789375 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:20:51.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.796015 systemd[1]: Mounting boot.mount... Dec 13 02:20:51.845004 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:20:51.882375 systemd[1]: Mounted boot.mount. Dec 13 02:20:51.887910 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 02:20:51.915120 (sd-sysext)[1604]: Using extensions 'kubernetes'. Dec 13 02:20:51.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.915849 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:20:51.916767 (sd-sysext)[1604]: Merged extensions into '/usr'. Dec 13 02:20:51.943367 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:20:51.947169 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:20:51.948792 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:20:51.954792 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:20:51.963407 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:20:51.968293 systemd[1]: Starting modprobe@loop.service... Dec 13 02:20:51.971088 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:20:51.971321 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:20:51.971622 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:20:51.978857 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:20:51.981380 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:20:51.981953 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:20:51.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.984698 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:20:51.985047 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:20:51.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.986862 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:20:51.987209 systemd[1]: Finished modprobe@loop.service. Dec 13 02:20:51.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.992018 systemd[1]: Finished systemd-sysext.service. Dec 13 02:20:51.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:51.997431 systemd[1]: Starting ensure-sysext.service... Dec 13 02:20:52.004898 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:20:52.005005 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:20:52.008882 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:20:52.018063 systemd[1]: Reloading. Dec 13 02:20:52.090012 systemd-tmpfiles[1611]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:20:52.098563 systemd-tmpfiles[1611]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:20:52.151939 systemd-tmpfiles[1611]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:20:52.158519 /usr/lib/systemd/system-generators/torcx-generator[1630]: time="2024-12-13T02:20:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:20:52.158559 /usr/lib/systemd/system-generators/torcx-generator[1630]: time="2024-12-13T02:20:52Z" level=info msg="torcx already run" Dec 13 02:20:52.332116 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:20:52.332367 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:20:52.373100 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:20:52.503000 audit: BPF prog-id=24 op=LOAD Dec 13 02:20:52.503000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:20:52.503000 audit: BPF prog-id=25 op=LOAD Dec 13 02:20:52.503000 audit: BPF prog-id=26 op=LOAD Dec 13 02:20:52.503000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:20:52.503000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:20:52.505000 audit: BPF prog-id=27 op=LOAD Dec 13 02:20:52.505000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:20:52.507000 audit: BPF prog-id=28 op=LOAD Dec 13 02:20:52.507000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:20:52.507000 audit: BPF prog-id=29 op=LOAD Dec 13 02:20:52.507000 audit: BPF prog-id=30 op=LOAD Dec 13 02:20:52.507000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:20:52.507000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:20:52.508000 audit: BPF prog-id=31 op=LOAD Dec 13 02:20:52.508000 audit: BPF prog-id=32 op=LOAD Dec 13 02:20:52.508000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:20:52.508000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:20:52.517327 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:20:52.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.520024 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:20:52.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.525981 systemd[1]: Starting audit-rules.service... Dec 13 02:20:52.532905 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:20:52.537000 audit: BPF prog-id=33 op=LOAD Dec 13 02:20:52.537055 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:20:52.541107 systemd[1]: Starting systemd-resolved.service... Dec 13 02:20:52.542000 audit: BPF prog-id=34 op=LOAD Dec 13 02:20:52.545903 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:20:52.549622 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:20:52.581505 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:20:52.585543 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:20:52.590634 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:20:52.599462 systemd[1]: Starting modprobe@loop.service... Dec 13 02:20:52.602411 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:20:52.602683 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:20:52.607169 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:20:52.609059 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:20:52.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.612990 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:20:52.614159 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:20:52.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.616503 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:20:52.616870 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:20:52.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.619005 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:20:52.619196 systemd[1]: Finished modprobe@loop.service. Dec 13 02:20:52.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.620897 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:20:52.621023 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:20:52.621160 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:20:52.621336 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:20:52.621461 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:20:52.625779 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:20:52.626161 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:20:52.630868 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:20:52.634000 audit[1690]: SYSTEM_BOOT pid=1690 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.636209 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:20:52.641071 systemd[1]: Starting modprobe@loop.service... Dec 13 02:20:52.642047 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:20:52.642322 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:20:52.642612 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:20:52.642767 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:20:52.644348 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:20:52.644587 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:20:52.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.659289 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:20:52.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.661708 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:20:52.662412 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:20:52.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.666116 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:20:52.666555 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:20:52.671301 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:20:52.675433 systemd[1]: Starting modprobe@drm.service... Dec 13 02:20:52.678352 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:20:52.678564 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:20:52.678829 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:20:52.679061 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:20:52.679197 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:20:52.681019 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:20:52.681237 systemd[1]: Finished modprobe@loop.service. Dec 13 02:20:52.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.689120 systemd[1]: Finished ensure-sysext.service. Dec 13 02:20:52.701571 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:20:52.701775 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:20:52.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.702948 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:20:52.705322 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:20:52.705499 systemd[1]: Finished modprobe@drm.service. Dec 13 02:20:52.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.765421 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:20:52.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.805827 systemd-networkd[1470]: eth0: Gained IPv6LL Dec 13 02:20:52.814297 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:20:52.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:20:52.820916 systemd-resolved[1688]: Positive Trust Anchors: Dec 13 02:20:52.821307 systemd-resolved[1688]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:20:52.822377 systemd-resolved[1688]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:20:52.827123 augenrules[1713]: No rules Dec 13 02:20:52.825000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:20:52.825000 audit[1713]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffec596ed0 a2=420 a3=0 items=0 ppid=1685 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:20:52.825000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:20:52.828998 systemd[1]: Finished audit-rules.service. Dec 13 02:20:52.844594 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:20:52.846004 systemd[1]: Reached target time-set.target. Dec 13 02:20:52.873836 systemd-resolved[1688]: Defaulting to hostname 'linux'. Dec 13 02:20:52.880812 systemd[1]: Started systemd-resolved.service. Dec 13 02:20:52.887921 systemd[1]: Reached target network.target. Dec 13 02:20:52.890402 systemd[1]: Reached target network-online.target. Dec 13 02:20:52.891576 systemd[1]: Reached target nss-lookup.target. Dec 13 02:20:52.910294 ldconfig[1577]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:20:52.930776 systemd[1]: Finished ldconfig.service. Dec 13 02:20:52.936558 systemd[1]: Starting systemd-update-done.service... Dec 13 02:20:52.968152 systemd[1]: Finished systemd-update-done.service. Dec 13 02:20:52.973034 systemd[1]: Reached target sysinit.target. Dec 13 02:20:52.976926 systemd[1]: Started motdgen.path. Dec 13 02:20:52.977963 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:20:52.979973 systemd[1]: Started logrotate.timer. Dec 13 02:20:52.980994 systemd[1]: Started mdadm.timer. Dec 13 02:20:52.981899 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:20:52.983020 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:20:52.983064 systemd[1]: Reached target paths.target. Dec 13 02:20:52.984192 systemd[1]: Reached target timers.target. Dec 13 02:20:52.985623 systemd[1]: Listening on dbus.socket. Dec 13 02:20:52.988831 systemd[1]: Starting docker.socket... Dec 13 02:20:53.946623 systemd-resolved[1688]: Clock change detected. Flushing caches. Dec 13 02:20:53.947218 systemd-timesyncd[1689]: Contacted time server 23.186.168.2:123 (0.flatcar.pool.ntp.org). Dec 13 02:20:53.947309 systemd-timesyncd[1689]: Initial clock synchronization to Fri 2024-12-13 02:20:53.946573 UTC. Dec 13 02:20:53.950183 systemd[1]: Listening on sshd.socket. Dec 13 02:20:53.951674 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:20:53.952675 systemd[1]: Listening on docker.socket. Dec 13 02:20:53.953901 systemd[1]: Reached target sockets.target. Dec 13 02:20:53.955015 systemd[1]: Reached target basic.target. Dec 13 02:20:53.956195 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:20:53.956231 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:20:53.958206 systemd[1]: Started amazon-ssm-agent.service. Dec 13 02:20:53.962640 systemd[1]: Starting containerd.service... Dec 13 02:20:53.967761 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 02:20:53.972094 systemd[1]: Starting dbus.service... Dec 13 02:20:53.975027 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:20:53.982565 systemd[1]: Starting extend-filesystems.service... Dec 13 02:20:53.984916 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:20:53.988077 systemd[1]: Starting kubelet.service... Dec 13 02:20:53.992208 systemd[1]: Starting motdgen.service... Dec 13 02:20:53.997513 systemd[1]: Started nvidia.service. Dec 13 02:20:54.003519 systemd[1]: Starting prepare-helm.service... Dec 13 02:20:54.011665 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:20:54.014995 systemd[1]: Starting sshd-keygen.service... Dec 13 02:20:54.022176 systemd[1]: Starting systemd-logind.service... Dec 13 02:20:54.024154 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:20:54.024346 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 02:20:54.076632 jq[1736]: true Dec 13 02:20:54.025749 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:20:54.029144 systemd[1]: Starting update-engine.service... Dec 13 02:20:54.033080 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:20:54.086365 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:20:54.096218 jq[1726]: false Dec 13 02:20:54.086851 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:20:54.090101 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:20:54.090714 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:20:54.278248 jq[1745]: true Dec 13 02:20:54.282650 tar[1739]: linux-amd64/helm Dec 13 02:20:54.356191 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:20:54.356425 systemd[1]: Finished motdgen.service. Dec 13 02:20:54.400124 extend-filesystems[1727]: Found loop1 Dec 13 02:20:54.423083 extend-filesystems[1727]: Found nvme0n1 Dec 13 02:20:54.424549 extend-filesystems[1727]: Found nvme0n1p1 Dec 13 02:20:54.431750 extend-filesystems[1727]: Found nvme0n1p2 Dec 13 02:20:54.431750 extend-filesystems[1727]: Found nvme0n1p3 Dec 13 02:20:54.444282 extend-filesystems[1727]: Found usr Dec 13 02:20:54.451641 extend-filesystems[1727]: Found nvme0n1p4 Dec 13 02:20:54.451641 extend-filesystems[1727]: Found nvme0n1p6 Dec 13 02:20:54.451641 extend-filesystems[1727]: Found nvme0n1p7 Dec 13 02:20:54.451641 extend-filesystems[1727]: Found nvme0n1p9 Dec 13 02:20:54.458188 extend-filesystems[1727]: Checking size of /dev/nvme0n1p9 Dec 13 02:20:54.512875 dbus-daemon[1725]: [system] SELinux support is enabled Dec 13 02:20:54.516164 amazon-ssm-agent[1722]: 2024/12/13 02:20:54 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 02:20:54.518446 systemd[1]: Started dbus.service. Dec 13 02:20:54.523193 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:20:54.523242 systemd[1]: Reached target system-config.target. Dec 13 02:20:54.524382 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:20:54.524423 systemd[1]: Reached target user-config.target. Dec 13 02:20:54.555968 amazon-ssm-agent[1722]: Initializing new seelog logger Dec 13 02:20:54.557108 amazon-ssm-agent[1722]: New Seelog Logger Creation Complete Dec 13 02:20:54.557204 amazon-ssm-agent[1722]: 2024/12/13 02:20:54 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 02:20:54.557204 amazon-ssm-agent[1722]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 02:20:54.557586 amazon-ssm-agent[1722]: 2024/12/13 02:20:54 processing appconfig overrides Dec 13 02:20:54.566080 dbus-daemon[1725]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1470 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 02:20:54.567634 env[1740]: time="2024-12-13T02:20:54.567480697Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:20:54.620746 extend-filesystems[1727]: Resized partition /dev/nvme0n1p9 Dec 13 02:20:54.625422 update_engine[1735]: I1213 02:20:54.624086 1735 main.cc:92] Flatcar Update Engine starting Dec 13 02:20:54.628073 dbus-daemon[1725]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 02:20:54.634589 systemd[1]: Starting systemd-hostnamed.service... Dec 13 02:20:54.647792 extend-filesystems[1794]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:20:54.661802 systemd[1]: Started update-engine.service. Dec 13 02:20:54.663692 update_engine[1735]: I1213 02:20:54.663657 1735 update_check_scheduler.cc:74] Next update check in 5m2s Dec 13 02:20:54.667350 systemd[1]: Started locksmithd.service. Dec 13 02:20:54.672623 bash[1787]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:20:54.674666 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:20:54.677899 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 02:20:54.765870 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 02:20:54.800149 extend-filesystems[1794]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 02:20:54.800149 extend-filesystems[1794]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 02:20:54.800149 extend-filesystems[1794]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 02:20:54.804231 extend-filesystems[1727]: Resized filesystem in /dev/nvme0n1p9 Dec 13 02:20:54.805672 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:20:54.805942 systemd[1]: Finished extend-filesystems.service. Dec 13 02:20:54.833929 systemd-logind[1734]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:20:54.833961 systemd-logind[1734]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 02:20:54.833988 systemd-logind[1734]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:20:54.839171 systemd-logind[1734]: New seat seat0. Dec 13 02:20:54.846174 systemd[1]: Started systemd-logind.service. Dec 13 02:20:54.903210 dbus-daemon[1725]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 02:20:54.903391 systemd[1]: Started systemd-hostnamed.service. Dec 13 02:20:54.904129 dbus-daemon[1725]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1796 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 02:20:54.909621 systemd[1]: Starting polkit.service... Dec 13 02:20:54.932022 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 02:20:54.934452 env[1740]: time="2024-12-13T02:20:54.934403631Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:20:54.939996 polkitd[1815]: Started polkitd version 121 Dec 13 02:20:54.943455 env[1740]: time="2024-12-13T02:20:54.943213593Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:20:54.948060 env[1740]: time="2024-12-13T02:20:54.948002375Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:20:54.948060 env[1740]: time="2024-12-13T02:20:54.948058444Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:20:54.948420 env[1740]: time="2024-12-13T02:20:54.948385645Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:20:54.948558 env[1740]: time="2024-12-13T02:20:54.948421586Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:20:54.948558 env[1740]: time="2024-12-13T02:20:54.948441152Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:20:54.948558 env[1740]: time="2024-12-13T02:20:54.948455362Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:20:54.948678 env[1740]: time="2024-12-13T02:20:54.948560942Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:20:54.948915 env[1740]: time="2024-12-13T02:20:54.948886723Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:20:54.949535 env[1740]: time="2024-12-13T02:20:54.949117666Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:20:54.949535 env[1740]: time="2024-12-13T02:20:54.949146500Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:20:54.949535 env[1740]: time="2024-12-13T02:20:54.949222572Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:20:54.949535 env[1740]: time="2024-12-13T02:20:54.949238887Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:20:54.961532 polkitd[1815]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 02:20:54.962805 polkitd[1815]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 02:20:54.964155 env[1740]: time="2024-12-13T02:20:54.964098420Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:20:54.964357 env[1740]: time="2024-12-13T02:20:54.964336494Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:20:54.964455 env[1740]: time="2024-12-13T02:20:54.964438798Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:20:54.964611 env[1740]: time="2024-12-13T02:20:54.964592701Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:20:54.964696 env[1740]: time="2024-12-13T02:20:54.964681098Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:20:54.964792 env[1740]: time="2024-12-13T02:20:54.964762921Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:20:54.964887 env[1740]: time="2024-12-13T02:20:54.964864151Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:20:54.964960 env[1740]: time="2024-12-13T02:20:54.964947452Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:20:54.965051 env[1740]: time="2024-12-13T02:20:54.965036786Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:20:54.965127 env[1740]: time="2024-12-13T02:20:54.965113302Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:20:54.965253 env[1740]: time="2024-12-13T02:20:54.965235958Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:20:54.965330 env[1740]: time="2024-12-13T02:20:54.965316189Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:20:54.965551 env[1740]: time="2024-12-13T02:20:54.965532297Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:20:54.965730 env[1740]: time="2024-12-13T02:20:54.965713940Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:20:54.966301 env[1740]: time="2024-12-13T02:20:54.966268371Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:20:54.966415 env[1740]: time="2024-12-13T02:20:54.966397671Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.966508 env[1740]: time="2024-12-13T02:20:54.966492225Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:20:54.966648 env[1740]: time="2024-12-13T02:20:54.966632300Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.966799 env[1740]: time="2024-12-13T02:20:54.966782596Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.966908 env[1740]: time="2024-12-13T02:20:54.966892648Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.966983 env[1740]: time="2024-12-13T02:20:54.966968501Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.967056 env[1740]: time="2024-12-13T02:20:54.967042143Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.967140 env[1740]: time="2024-12-13T02:20:54.967126297Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.967224 env[1740]: time="2024-12-13T02:20:54.967210337Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.967297 env[1740]: time="2024-12-13T02:20:54.967283947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.967390 env[1740]: time="2024-12-13T02:20:54.967375156Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:20:54.967613 env[1740]: time="2024-12-13T02:20:54.967595033Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.967711 env[1740]: time="2024-12-13T02:20:54.967695706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.967789 env[1740]: time="2024-12-13T02:20:54.967775967Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.967911 env[1740]: time="2024-12-13T02:20:54.967896057Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:20:54.967993 env[1740]: time="2024-12-13T02:20:54.967974844Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:20:54.968052 env[1740]: time="2024-12-13T02:20:54.968041130Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:20:54.968129 env[1740]: time="2024-12-13T02:20:54.968112961Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:20:54.968242 env[1740]: time="2024-12-13T02:20:54.968226630Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:20:54.968650 env[1740]: time="2024-12-13T02:20:54.968574981Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:20:54.970948 env[1740]: time="2024-12-13T02:20:54.968817495Z" level=info msg="Connect containerd service" Dec 13 02:20:54.968892 polkitd[1815]: Finished loading, compiling and executing 2 rules Dec 13 02:20:54.971214 env[1740]: time="2024-12-13T02:20:54.971184571Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:20:54.975866 dbus-daemon[1725]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 02:20:54.976076 systemd[1]: Started polkit.service. Dec 13 02:20:54.976933 polkitd[1815]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 02:20:54.977619 env[1740]: time="2024-12-13T02:20:54.977576965Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:20:54.979246 env[1740]: time="2024-12-13T02:20:54.979208848Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:20:54.980613 env[1740]: time="2024-12-13T02:20:54.980582712Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:20:54.981031 env[1740]: time="2024-12-13T02:20:54.981013534Z" level=info msg="containerd successfully booted in 0.426633s" Dec 13 02:20:54.981115 systemd[1]: Started containerd.service. Dec 13 02:20:55.004596 env[1740]: time="2024-12-13T02:20:55.004485921Z" level=info msg="Start subscribing containerd event" Dec 13 02:20:55.005043 env[1740]: time="2024-12-13T02:20:55.005014695Z" level=info msg="Start recovering state" Dec 13 02:20:55.005821 systemd-hostnamed[1796]: Hostname set to (transient) Dec 13 02:20:55.005821 systemd-resolved[1688]: System hostname changed to 'ip-172-31-18-8'. Dec 13 02:20:55.007247 env[1740]: time="2024-12-13T02:20:55.006803479Z" level=info msg="Start event monitor" Dec 13 02:20:55.007615 env[1740]: time="2024-12-13T02:20:55.007589595Z" level=info msg="Start snapshots syncer" Dec 13 02:20:55.007733 env[1740]: time="2024-12-13T02:20:55.007707606Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:20:55.010243 env[1740]: time="2024-12-13T02:20:55.009992683Z" level=info msg="Start streaming server" Dec 13 02:20:55.251483 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Create new startup processor Dec 13 02:20:55.251904 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 02:20:55.252036 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Initializing bookkeeping folders Dec 13 02:20:55.252124 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO removing the completed state files Dec 13 02:20:55.252213 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Initializing bookkeeping folders for long running plugins Dec 13 02:20:55.252307 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 02:20:55.252392 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Initializing healthcheck folders for long running plugins Dec 13 02:20:55.252470 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Initializing locations for inventory plugin Dec 13 02:20:55.252560 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Initializing default location for custom inventory Dec 13 02:20:55.252646 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Initializing default location for file inventory Dec 13 02:20:55.252736 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Initializing default location for role inventory Dec 13 02:20:55.252819 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Init the cloudwatchlogs publisher Dec 13 02:20:55.252926 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Successfully loaded platform independent plugin aws:configurePackage Dec 13 02:20:55.253014 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Successfully loaded platform independent plugin aws:downloadContent Dec 13 02:20:55.253112 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Successfully loaded platform independent plugin aws:runDocument Dec 13 02:20:55.253203 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 02:20:55.253285 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 02:20:55.253364 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Successfully loaded platform independent plugin aws:configureDocker Dec 13 02:20:55.253434 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 02:20:55.253583 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 02:20:55.253675 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 02:20:55.253774 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 02:20:55.253889 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 02:20:55.253989 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO OS: linux, Arch: amd64 Dec 13 02:20:55.255798 amazon-ssm-agent[1722]: datastore file /var/lib/amazon/ssm/i-04719022c947c929d/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 02:20:55.264479 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 02:20:55.315274 coreos-metadata[1724]: Dec 13 02:20:55.315 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 02:20:55.324001 coreos-metadata[1724]: Dec 13 02:20:55.323 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 02:20:55.326223 coreos-metadata[1724]: Dec 13 02:20:55.326 INFO Fetch successful Dec 13 02:20:55.326223 coreos-metadata[1724]: Dec 13 02:20:55.326 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 02:20:55.327343 coreos-metadata[1724]: Dec 13 02:20:55.327 INFO Fetch successful Dec 13 02:20:55.336871 unknown[1724]: wrote ssh authorized keys file for user: core Dec 13 02:20:55.363706 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 02:20:55.368855 update-ssh-keys[1891]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:20:55.369721 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 02:20:55.458598 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 02:20:55.553166 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] Starting message polling Dec 13 02:20:55.647789 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 02:20:55.742717 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [instanceID=i-04719022c947c929d] Starting association polling Dec 13 02:20:55.839303 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 02:20:55.934335 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 02:20:55.979261 tar[1739]: linux-amd64/LICENSE Dec 13 02:20:55.979690 tar[1739]: linux-amd64/README.md Dec 13 02:20:55.986866 systemd[1]: Finished prepare-helm.service. Dec 13 02:20:56.029631 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 02:20:56.125219 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 02:20:56.138288 sshd_keygen[1766]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:20:56.181422 systemd[1]: Finished sshd-keygen.service. Dec 13 02:20:56.182349 locksmithd[1797]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:20:56.184576 systemd[1]: Starting issuegen.service... Dec 13 02:20:56.193866 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:20:56.194089 systemd[1]: Finished issuegen.service. Dec 13 02:20:56.197172 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:20:56.207745 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:20:56.210844 systemd[1]: Started getty@tty1.service. Dec 13 02:20:56.213933 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:20:56.215222 systemd[1]: Reached target getty.target. Dec 13 02:20:56.221949 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 02:20:56.317896 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 02:20:56.366312 systemd[1]: Started kubelet.service. Dec 13 02:20:56.367750 systemd[1]: Reached target multi-user.target. Dec 13 02:20:56.370528 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:20:56.382212 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:20:56.382424 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:20:56.383668 systemd[1]: Startup finished in 770ms (kernel) + 7.944s (initrd) + 11.662s (userspace) = 20.376s. Dec 13 02:20:56.414586 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 02:20:56.511325 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 02:20:56.607762 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-04719022c947c929d, requestId: 1c60b7d5-85be-47c4-b4a1-d8ec47633939 Dec 13 02:20:56.704593 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [OfflineService] Starting document processing engine... Dec 13 02:20:56.801432 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [OfflineService] [EngineProcessor] Starting Dec 13 02:20:56.898492 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 02:20:56.995859 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [OfflineService] Starting message polling Dec 13 02:20:57.017941 kubelet[1945]: E1213 02:20:57.017887 1945 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:20:57.019966 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:20:57.020148 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:20:57.020461 systemd[1]: kubelet.service: Consumed 1.128s CPU time. Dec 13 02:20:57.093327 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [OfflineService] Starting send replies to MDS Dec 13 02:20:57.191055 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 02:20:57.289354 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 02:20:57.387151 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 02:20:57.485458 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessageGatewayService] listening reply. Dec 13 02:20:57.584010 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 02:20:57.682647 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [StartupProcessor] Executing startup processor tasks Dec 13 02:20:57.781550 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 02:20:57.880728 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 02:20:57.979993 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 02:20:58.079462 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-04719022c947c929d?role=subscribe&stream=input Dec 13 02:20:58.179211 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-04719022c947c929d?role=subscribe&stream=input Dec 13 02:20:58.279139 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 02:20:58.379252 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 02:20:58.479534 amazon-ssm-agent[1722]: 2024-12-13 02:20:55 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 02:21:02.179120 systemd[1]: Created slice system-sshd.slice. Dec 13 02:21:02.183210 systemd[1]: Started sshd@0-172.31.18.8:22-139.178.68.195:48240.service. Dec 13 02:21:02.430585 sshd[1953]: Accepted publickey for core from 139.178.68.195 port 48240 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:21:02.434400 sshd[1953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:21:02.463481 systemd[1]: Created slice user-500.slice. Dec 13 02:21:02.475255 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:21:02.498673 systemd-logind[1734]: New session 1 of user core. Dec 13 02:21:02.526389 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:21:02.529384 systemd[1]: Starting user@500.service... Dec 13 02:21:02.534585 (systemd)[1956]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:21:02.719151 systemd[1956]: Queued start job for default target default.target. Dec 13 02:21:02.720033 systemd[1956]: Reached target paths.target. Dec 13 02:21:02.720196 systemd[1956]: Reached target sockets.target. Dec 13 02:21:02.720220 systemd[1956]: Reached target timers.target. Dec 13 02:21:02.720238 systemd[1956]: Reached target basic.target. Dec 13 02:21:02.720611 systemd[1]: Started user@500.service. Dec 13 02:21:02.722042 systemd[1]: Started session-1.scope. Dec 13 02:21:02.722902 systemd[1956]: Reached target default.target. Dec 13 02:21:02.723249 systemd[1956]: Startup finished in 170ms. Dec 13 02:21:02.870247 systemd[1]: Started sshd@1-172.31.18.8:22-139.178.68.195:48242.service. Dec 13 02:21:03.040964 sshd[1965]: Accepted publickey for core from 139.178.68.195 port 48242 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:21:03.043351 sshd[1965]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:21:03.049147 systemd-logind[1734]: New session 2 of user core. Dec 13 02:21:03.050878 systemd[1]: Started session-2.scope. Dec 13 02:21:03.193649 sshd[1965]: pam_unix(sshd:session): session closed for user core Dec 13 02:21:03.198460 systemd[1]: sshd@1-172.31.18.8:22-139.178.68.195:48242.service: Deactivated successfully. Dec 13 02:21:03.199787 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:21:03.201503 systemd-logind[1734]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:21:03.202737 systemd-logind[1734]: Removed session 2. Dec 13 02:21:03.221191 systemd[1]: Started sshd@2-172.31.18.8:22-139.178.68.195:48256.service. Dec 13 02:21:03.389414 sshd[1971]: Accepted publickey for core from 139.178.68.195 port 48256 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:21:03.392454 sshd[1971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:21:03.398584 systemd-logind[1734]: New session 3 of user core. Dec 13 02:21:03.400093 systemd[1]: Started session-3.scope. Dec 13 02:21:03.533486 sshd[1971]: pam_unix(sshd:session): session closed for user core Dec 13 02:21:03.537337 systemd[1]: sshd@2-172.31.18.8:22-139.178.68.195:48256.service: Deactivated successfully. Dec 13 02:21:03.538472 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:21:03.539208 systemd-logind[1734]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:21:03.540146 systemd-logind[1734]: Removed session 3. Dec 13 02:21:03.576116 systemd[1]: Started sshd@3-172.31.18.8:22-139.178.68.195:48270.service. Dec 13 02:21:03.752632 sshd[1977]: Accepted publickey for core from 139.178.68.195 port 48270 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:21:03.754803 sshd[1977]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:21:03.762222 systemd[1]: Started session-4.scope. Dec 13 02:21:03.763021 systemd-logind[1734]: New session 4 of user core. Dec 13 02:21:03.892981 sshd[1977]: pam_unix(sshd:session): session closed for user core Dec 13 02:21:03.896987 systemd[1]: sshd@3-172.31.18.8:22-139.178.68.195:48270.service: Deactivated successfully. Dec 13 02:21:03.898120 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:21:03.899490 systemd-logind[1734]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:21:03.900638 systemd-logind[1734]: Removed session 4. Dec 13 02:21:03.921953 systemd[1]: Started sshd@4-172.31.18.8:22-139.178.68.195:48282.service. Dec 13 02:21:04.092312 sshd[1983]: Accepted publickey for core from 139.178.68.195 port 48282 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:21:04.094626 sshd[1983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:21:04.101486 systemd[1]: Started session-5.scope. Dec 13 02:21:04.102636 systemd-logind[1734]: New session 5 of user core. Dec 13 02:21:04.241493 sudo[1986]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:21:04.241939 sudo[1986]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:21:04.261243 dbus-daemon[1725]: \xd0\xdd\xc5T\u0010V: received setenforce notice (enforcing=-1347569520) Dec 13 02:21:04.268773 sudo[1986]: pam_unix(sudo:session): session closed for user root Dec 13 02:21:04.295525 sshd[1983]: pam_unix(sshd:session): session closed for user core Dec 13 02:21:04.300050 systemd[1]: sshd@4-172.31.18.8:22-139.178.68.195:48282.service: Deactivated successfully. Dec 13 02:21:04.301282 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:21:04.302226 systemd-logind[1734]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:21:04.303321 systemd-logind[1734]: Removed session 5. Dec 13 02:21:04.329050 systemd[1]: Started sshd@5-172.31.18.8:22-139.178.68.195:48296.service. Dec 13 02:21:04.513772 sshd[1990]: Accepted publickey for core from 139.178.68.195 port 48296 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:21:04.515151 sshd[1990]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:21:04.526910 systemd[1]: Started session-6.scope. Dec 13 02:21:04.527440 systemd-logind[1734]: New session 6 of user core. Dec 13 02:21:04.641804 sudo[1994]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:21:04.642321 sudo[1994]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:21:04.645780 sudo[1994]: pam_unix(sudo:session): session closed for user root Dec 13 02:21:04.652459 sudo[1993]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:21:04.652959 sudo[1993]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:21:04.671135 systemd[1]: Stopping audit-rules.service... Dec 13 02:21:04.672000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:21:04.674575 kernel: kauditd_printk_skb: 222 callbacks suppressed Dec 13 02:21:04.674659 kernel: audit: type=1305 audit(1734056464.672:203): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:21:04.674687 auditctl[1997]: No rules Dec 13 02:21:04.682856 kernel: audit: type=1300 audit(1734056464.672:203): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd89c5aa30 a2=420 a3=0 items=0 ppid=1 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:04.682988 kernel: audit: type=1327 audit(1734056464.672:203): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:21:04.672000 audit[1997]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd89c5aa30 a2=420 a3=0 items=0 ppid=1 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:04.672000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:21:04.675410 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:21:04.675632 systemd[1]: Stopped audit-rules.service. Dec 13 02:21:04.683905 systemd[1]: Starting audit-rules.service... Dec 13 02:21:04.690094 kernel: audit: type=1131 audit(1734056464.673:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.725234 augenrules[2014]: No rules Dec 13 02:21:04.726206 systemd[1]: Finished audit-rules.service. Dec 13 02:21:04.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.727867 sudo[1993]: pam_unix(sudo:session): session closed for user root Dec 13 02:21:04.727000 audit[1993]: USER_END pid=1993 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.738645 kernel: audit: type=1130 audit(1734056464.725:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.738790 kernel: audit: type=1106 audit(1734056464.727:206): pid=1993 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.738920 kernel: audit: type=1104 audit(1734056464.727:207): pid=1993 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.727000 audit[1993]: CRED_DISP pid=1993 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.750703 sshd[1990]: pam_unix(sshd:session): session closed for user core Dec 13 02:21:04.752000 audit[1990]: USER_END pid=1990 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:04.755673 systemd[1]: sshd@5-172.31.18.8:22-139.178.68.195:48296.service: Deactivated successfully. Dec 13 02:21:04.756646 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:21:04.752000 audit[1990]: CRED_DISP pid=1990 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:04.760196 systemd-logind[1734]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:21:04.762223 systemd-logind[1734]: Removed session 6. Dec 13 02:21:04.763008 kernel: audit: type=1106 audit(1734056464.752:208): pid=1990 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:04.763092 kernel: audit: type=1104 audit(1734056464.752:209): pid=1990 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:04.763134 kernel: audit: type=1131 audit(1734056464.755:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.18.8:22-139.178.68.195:48296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.18.8:22-139.178.68.195:48296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.778332 systemd[1]: Started sshd@6-172.31.18.8:22-139.178.68.195:48306.service. Dec 13 02:21:04.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.18.8:22-139.178.68.195:48306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:04.953000 audit[2020]: USER_ACCT pid=2020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:04.954801 sshd[2020]: Accepted publickey for core from 139.178.68.195 port 48306 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:21:04.955000 audit[2020]: CRED_ACQ pid=2020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:04.955000 audit[2020]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc957e8560 a2=3 a3=0 items=0 ppid=1 pid=2020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:04.955000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:21:04.956963 sshd[2020]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:21:04.973758 systemd-logind[1734]: New session 7 of user core. Dec 13 02:21:04.974618 systemd[1]: Started session-7.scope. Dec 13 02:21:04.999000 audit[2020]: USER_START pid=2020 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:05.003000 audit[2022]: CRED_ACQ pid=2022 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:05.108000 audit[2023]: USER_ACCT pid=2023 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:05.108000 audit[2023]: CRED_REFR pid=2023 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:05.109281 sudo[2023]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:21:05.109696 sudo[2023]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:21:05.125000 audit[2023]: USER_START pid=2023 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:05.167497 systemd[1]: Starting docker.service... Dec 13 02:21:05.215328 env[2033]: time="2024-12-13T02:21:05.215269105Z" level=info msg="Starting up" Dec 13 02:21:05.218148 env[2033]: time="2024-12-13T02:21:05.218004392Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:21:05.218148 env[2033]: time="2024-12-13T02:21:05.218036731Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:21:05.218148 env[2033]: time="2024-12-13T02:21:05.218059424Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:21:05.218415 env[2033]: time="2024-12-13T02:21:05.218388546Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:21:05.220359 env[2033]: time="2024-12-13T02:21:05.220319529Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:21:05.220359 env[2033]: time="2024-12-13T02:21:05.220342789Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:21:05.220359 env[2033]: time="2024-12-13T02:21:05.220362640Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:21:05.220690 env[2033]: time="2024-12-13T02:21:05.220374725Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:21:05.227994 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2599158284-merged.mount: Deactivated successfully. Dec 13 02:21:05.290045 env[2033]: time="2024-12-13T02:21:05.289994363Z" level=info msg="Loading containers: start." Dec 13 02:21:05.420000 audit[2065]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2065 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.420000 audit[2065]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffceb110820 a2=0 a3=7ffceb11080c items=0 ppid=2033 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.420000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 02:21:05.424000 audit[2067]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2067 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.424000 audit[2067]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc77df1920 a2=0 a3=7ffc77df190c items=0 ppid=2033 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.424000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 02:21:05.426000 audit[2069]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.426000 audit[2069]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff705add40 a2=0 a3=7fff705add2c items=0 ppid=2033 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.426000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:21:05.428000 audit[2071]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2071 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.428000 audit[2071]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc429fa1f0 a2=0 a3=7ffc429fa1dc items=0 ppid=2033 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.428000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:21:05.431000 audit[2073]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.431000 audit[2073]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe84e2dfc0 a2=0 a3=7ffe84e2dfac items=0 ppid=2033 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 02:21:05.450000 audit[2078]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2078 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.450000 audit[2078]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa12ae910 a2=0 a3=7fffa12ae8fc items=0 ppid=2033 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.450000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 02:21:05.467000 audit[2080]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2080 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.467000 audit[2080]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd33081040 a2=0 a3=7ffd3308102c items=0 ppid=2033 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.467000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 02:21:05.469000 audit[2082]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.469000 audit[2082]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffded517a50 a2=0 a3=7ffded517a3c items=0 ppid=2033 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.469000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 02:21:05.472000 audit[2084]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.472000 audit[2084]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc4dfd6370 a2=0 a3=7ffc4dfd635c items=0 ppid=2033 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.472000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:21:05.488000 audit[2088]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.488000 audit[2088]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcade7b750 a2=0 a3=7ffcade7b73c items=0 ppid=2033 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.488000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:21:05.494000 audit[2089]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.494000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc89176b70 a2=0 a3=7ffc89176b5c items=0 ppid=2033 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.494000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:21:05.506290 kernel: Initializing XFRM netlink socket Dec 13 02:21:05.549744 env[2033]: time="2024-12-13T02:21:05.549696398Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 02:21:05.552157 (udev-worker)[2045]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:21:05.601000 audit[2097]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.601000 audit[2097]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff06653870 a2=0 a3=7fff0665385c items=0 ppid=2033 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.601000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 02:21:05.668000 audit[2100]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.668000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe1a7d4c30 a2=0 a3=7ffe1a7d4c1c items=0 ppid=2033 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.668000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 02:21:05.672000 audit[2103]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.672000 audit[2103]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffecc8a7320 a2=0 a3=7ffecc8a730c items=0 ppid=2033 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.672000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 02:21:05.677000 audit[2105]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2105 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.677000 audit[2105]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff28fea0c0 a2=0 a3=7fff28fea0ac items=0 ppid=2033 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.677000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 02:21:05.680000 audit[2107]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.680000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe02325d90 a2=0 a3=7ffe02325d7c items=0 ppid=2033 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.680000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 02:21:05.683000 audit[2109]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.683000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffd8684310 a2=0 a3=7fffd86842fc items=0 ppid=2033 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.683000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 02:21:05.685000 audit[2111]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.685000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe6db861f0 a2=0 a3=7ffe6db861dc items=0 ppid=2033 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 02:21:05.700000 audit[2114]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.700000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd5683b590 a2=0 a3=7ffd5683b57c items=0 ppid=2033 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 02:21:05.703000 audit[2116]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.703000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff19997e80 a2=0 a3=7fff19997e6c items=0 ppid=2033 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.703000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:21:05.706000 audit[2118]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2118 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.706000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff140626a0 a2=0 a3=7fff1406268c items=0 ppid=2033 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:21:05.709000 audit[2120]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.709000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffccb17e090 a2=0 a3=7ffccb17e07c items=0 ppid=2033 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.709000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 02:21:05.711483 systemd-networkd[1470]: docker0: Link UP Dec 13 02:21:05.726000 audit[2124]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.726000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd8a47f720 a2=0 a3=7ffd8a47f70c items=0 ppid=2033 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.726000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:21:05.731000 audit[2125]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:05.731000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd78bd5670 a2=0 a3=7ffd78bd565c items=0 ppid=2033 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:05.731000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:21:05.732682 env[2033]: time="2024-12-13T02:21:05.732645499Z" level=info msg="Loading containers: done." Dec 13 02:21:05.764898 env[2033]: time="2024-12-13T02:21:05.764777506Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 02:21:05.765182 env[2033]: time="2024-12-13T02:21:05.765105488Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 02:21:05.765276 env[2033]: time="2024-12-13T02:21:05.765253902Z" level=info msg="Daemon has completed initialization" Dec 13 02:21:05.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:05.795096 systemd[1]: Started docker.service. Dec 13 02:21:05.801611 env[2033]: time="2024-12-13T02:21:05.801547285Z" level=info msg="API listen on /run/docker.sock" Dec 13 02:21:07.124970 env[1740]: time="2024-12-13T02:21:07.124909377Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 02:21:07.271370 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:21:07.271659 systemd[1]: Stopped kubelet.service. Dec 13 02:21:07.271732 systemd[1]: kubelet.service: Consumed 1.128s CPU time. Dec 13 02:21:07.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:07.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:07.274546 systemd[1]: Starting kubelet.service... Dec 13 02:21:07.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:07.739616 systemd[1]: Started kubelet.service. Dec 13 02:21:07.801532 kubelet[2166]: E1213 02:21:07.801468 2166 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:21:07.806266 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:21:07.806444 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:21:07.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:21:07.945904 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1281897858.mount: Deactivated successfully. Dec 13 02:21:10.754572 env[1740]: time="2024-12-13T02:21:10.754483416Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:10.759256 env[1740]: time="2024-12-13T02:21:10.759204530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:10.762364 env[1740]: time="2024-12-13T02:21:10.762267352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:10.765008 env[1740]: time="2024-12-13T02:21:10.764965771Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:10.765945 env[1740]: time="2024-12-13T02:21:10.765906022Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 02:21:10.779973 env[1740]: time="2024-12-13T02:21:10.779900714Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 02:21:13.744817 env[1740]: time="2024-12-13T02:21:13.744758248Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:13.748430 env[1740]: time="2024-12-13T02:21:13.748382835Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:13.751245 env[1740]: time="2024-12-13T02:21:13.751204433Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:13.753874 env[1740]: time="2024-12-13T02:21:13.753816942Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:13.754732 env[1740]: time="2024-12-13T02:21:13.754691081Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 02:21:13.769148 env[1740]: time="2024-12-13T02:21:13.769098057Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 02:21:15.922705 env[1740]: time="2024-12-13T02:21:15.922645268Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:15.926366 env[1740]: time="2024-12-13T02:21:15.926313758Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:15.929843 env[1740]: time="2024-12-13T02:21:15.929782876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:15.932995 env[1740]: time="2024-12-13T02:21:15.932947728Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:15.933784 env[1740]: time="2024-12-13T02:21:15.933744156Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 02:21:15.946478 env[1740]: time="2024-12-13T02:21:15.946431681Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 02:21:16.255112 amazon-ssm-agent[1722]: 2024-12-13 02:21:16 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 02:21:17.316587 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2122516905.mount: Deactivated successfully. Dec 13 02:21:17.854799 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 02:21:17.855118 kernel: audit: type=1130 audit(1734056477.842:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:17.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:17.843315 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:21:17.843696 systemd[1]: Stopped kubelet.service. Dec 13 02:21:17.854410 systemd[1]: Starting kubelet.service... Dec 13 02:21:17.861133 kernel: audit: type=1131 audit(1734056477.842:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:17.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:18.326431 env[1740]: time="2024-12-13T02:21:18.325732567Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:18.353892 env[1740]: time="2024-12-13T02:21:18.353822921Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:18.364974 env[1740]: time="2024-12-13T02:21:18.364919856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:18.376610 env[1740]: time="2024-12-13T02:21:18.376550576Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:18.377785 env[1740]: time="2024-12-13T02:21:18.377742077Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 02:21:18.392590 env[1740]: time="2024-12-13T02:21:18.392550962Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 02:21:18.490198 kernel: audit: type=1130 audit(1734056478.483:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:18.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:18.484105 systemd[1]: Started kubelet.service. Dec 13 02:21:18.545126 kubelet[2202]: E1213 02:21:18.544420 2202 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:21:18.547449 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:21:18.547620 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:21:18.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:21:18.552962 kernel: audit: type=1131 audit(1734056478.547:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:21:19.063011 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1743351017.mount: Deactivated successfully. Dec 13 02:21:20.509354 env[1740]: time="2024-12-13T02:21:20.509243811Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:20.513635 env[1740]: time="2024-12-13T02:21:20.513579953Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:20.516573 env[1740]: time="2024-12-13T02:21:20.516531472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:20.519334 env[1740]: time="2024-12-13T02:21:20.519292599Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:20.520058 env[1740]: time="2024-12-13T02:21:20.520023160Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 02:21:20.535754 env[1740]: time="2024-12-13T02:21:20.535701968Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 02:21:21.081865 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1313018150.mount: Deactivated successfully. Dec 13 02:21:21.104738 env[1740]: time="2024-12-13T02:21:21.104684814Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:21.108340 env[1740]: time="2024-12-13T02:21:21.108292315Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:21.111344 env[1740]: time="2024-12-13T02:21:21.111301042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:21.114626 env[1740]: time="2024-12-13T02:21:21.114570183Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:21.115215 env[1740]: time="2024-12-13T02:21:21.115175264Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 02:21:21.130805 env[1740]: time="2024-12-13T02:21:21.130757089Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 02:21:21.773227 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount522522532.mount: Deactivated successfully. Dec 13 02:21:25.040415 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 02:21:25.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:25.048010 kernel: audit: type=1131 audit(1734056485.039:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:25.072051 kernel: audit: type=1334 audit(1734056485.065:254): prog-id=40 op=UNLOAD Dec 13 02:21:25.072194 kernel: audit: type=1334 audit(1734056485.065:255): prog-id=39 op=UNLOAD Dec 13 02:21:25.072232 kernel: audit: type=1334 audit(1734056485.065:256): prog-id=38 op=UNLOAD Dec 13 02:21:25.065000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:21:25.065000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:21:25.065000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:21:25.389486 env[1740]: time="2024-12-13T02:21:25.389430105Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:25.393905 env[1740]: time="2024-12-13T02:21:25.393857033Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:25.396769 env[1740]: time="2024-12-13T02:21:25.396726985Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:25.399215 env[1740]: time="2024-12-13T02:21:25.399176523Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:25.400276 env[1740]: time="2024-12-13T02:21:25.400239670Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 02:21:25.788496 amazon-ssm-agent[1722]: 2024-12-13 02:21:25 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 02:21:28.593106 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 02:21:28.611505 kernel: audit: type=1130 audit(1734056488.592:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:28.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:28.593373 systemd[1]: Stopped kubelet.service. Dec 13 02:21:28.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:28.616179 systemd[1]: Starting kubelet.service... Dec 13 02:21:28.623953 kernel: audit: type=1131 audit(1734056488.592:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:29.491356 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 02:21:29.491466 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 02:21:29.491946 systemd[1]: Stopped kubelet.service. Dec 13 02:21:29.498216 kernel: audit: type=1130 audit(1734056489.491:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:21:29.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:21:29.499369 systemd[1]: Starting kubelet.service... Dec 13 02:21:29.550312 systemd[1]: Reloading. Dec 13 02:21:29.745207 /usr/lib/systemd/system-generators/torcx-generator[2313]: time="2024-12-13T02:21:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:21:29.745250 /usr/lib/systemd/system-generators/torcx-generator[2313]: time="2024-12-13T02:21:29Z" level=info msg="torcx already run" Dec 13 02:21:29.874637 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:21:29.874668 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:21:29.929507 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:21:30.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.033862 kernel: audit: type=1400 audit(1734056490.025:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.034011 kernel: audit: type=1400 audit(1734056490.025:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.034053 kernel: audit: type=1400 audit(1734056490.026:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.029000 audit: BPF prog-id=43 op=LOAD Dec 13 02:21:30.029000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:21:30.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.033000 audit: BPF prog-id=44 op=LOAD Dec 13 02:21:30.033000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:21:30.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit: BPF prog-id=45 op=LOAD Dec 13 02:21:30.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.036000 audit: BPF prog-id=46 op=LOAD Dec 13 02:21:30.036000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:21:30.036000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:21:30.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.038000 audit: BPF prog-id=47 op=LOAD Dec 13 02:21:30.038000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:21:30.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.040000 audit: BPF prog-id=48 op=LOAD Dec 13 02:21:30.040000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:21:30.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.047273 kernel: kauditd_printk_skb: 76 callbacks suppressed Dec 13 02:21:30.047512 kernel: audit: type=1400 audit(1734056490.041:339): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.049007 kernel: audit: type=1334 audit(1734056490.041:340): prog-id=49 op=LOAD Dec 13 02:21:30.041000 audit: BPF prog-id=49 op=LOAD Dec 13 02:21:30.050493 kernel: audit: type=1334 audit(1734056490.041:341): prog-id=41 op=UNLOAD Dec 13 02:21:30.041000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:21:30.053820 kernel: audit: type=1400 audit(1734056490.042:342): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.057877 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 02:21:30.057953 kernel: audit: type=1400 audit(1734056490.042:343): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.057998 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 02:21:30.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.062396 kernel: audit: type=1400 audit(1734056490.042:344): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.062537 kernel: audit: backlog limit exceeded Dec 13 02:21:30.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.066365 kernel: audit: type=1400 audit(1734056490.042:345): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.043000 audit: BPF prog-id=50 op=LOAD Dec 13 02:21:30.043000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:21:30.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit: BPF prog-id=51 op=LOAD Dec 13 02:21:30.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.046000 audit: BPF prog-id=52 op=LOAD Dec 13 02:21:30.046000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:21:30.046000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:21:30.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.049000 audit: BPF prog-id=53 op=LOAD Dec 13 02:21:30.049000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:21:30.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.052000 audit: BPF prog-id=54 op=LOAD Dec 13 02:21:30.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.053000 audit: BPF prog-id=55 op=LOAD Dec 13 02:21:30.053000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:21:30.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:30.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:30.095938 systemd[1]: Started kubelet.service. Dec 13 02:21:30.099735 systemd[1]: Stopping kubelet.service... Dec 13 02:21:30.102364 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:21:30.102612 systemd[1]: Stopped kubelet.service. Dec 13 02:21:30.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:30.105039 systemd[1]: Starting kubelet.service... Dec 13 02:21:30.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:30.618863 systemd[1]: Started kubelet.service. Dec 13 02:21:30.708341 kubelet[2369]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:21:30.708341 kubelet[2369]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:21:30.708341 kubelet[2369]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:21:30.709961 kubelet[2369]: I1213 02:21:30.709912 2369 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:21:31.865994 kubelet[2369]: I1213 02:21:31.865943 2369 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:21:31.865994 kubelet[2369]: I1213 02:21:31.865981 2369 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:21:31.866645 kubelet[2369]: I1213 02:21:31.866284 2369 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:21:31.891028 kubelet[2369]: I1213 02:21:31.890990 2369 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:21:31.892115 kubelet[2369]: E1213 02:21:31.892088 2369 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.18.8:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:31.911480 kubelet[2369]: I1213 02:21:31.911432 2369 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:21:31.914364 kubelet[2369]: I1213 02:21:31.914308 2369 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:21:31.915140 kubelet[2369]: I1213 02:21:31.914363 2369 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-18-8","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:21:31.915336 kubelet[2369]: I1213 02:21:31.915162 2369 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:21:31.915336 kubelet[2369]: I1213 02:21:31.915182 2369 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:21:31.915443 kubelet[2369]: I1213 02:21:31.915351 2369 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:21:31.917812 kubelet[2369]: I1213 02:21:31.917783 2369 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:21:31.917986 kubelet[2369]: I1213 02:21:31.917973 2369 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:21:31.918104 kubelet[2369]: I1213 02:21:31.918071 2369 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:21:31.918104 kubelet[2369]: I1213 02:21:31.918098 2369 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:21:31.956326 kubelet[2369]: W1213 02:21:31.956247 2369 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.18.8:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:31.956517 kubelet[2369]: E1213 02:21:31.956343 2369 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.18.8:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:31.956517 kubelet[2369]: W1213 02:21:31.956432 2369 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.18.8:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-8&limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:31.956517 kubelet[2369]: E1213 02:21:31.956474 2369 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.18.8:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-8&limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:31.957671 kubelet[2369]: I1213 02:21:31.957639 2369 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:21:31.966071 kubelet[2369]: I1213 02:21:31.966026 2369 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:21:31.966243 kubelet[2369]: W1213 02:21:31.966127 2369 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:21:31.966933 kubelet[2369]: I1213 02:21:31.966905 2369 server.go:1264] "Started kubelet" Dec 13 02:21:31.967139 kubelet[2369]: I1213 02:21:31.967081 2369 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:21:31.968354 kubelet[2369]: I1213 02:21:31.968326 2369 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:21:31.973201 kubelet[2369]: I1213 02:21:31.973124 2369 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:21:31.973678 kubelet[2369]: I1213 02:21:31.973658 2369 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:21:31.973000 audit[2369]: AVC avc: denied { mac_admin } for pid=2369 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:31.973000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:21:31.973000 audit[2369]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00069d980 a1=c000ceaed0 a2=c00069d950 a3=25 items=0 ppid=1 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:31.973000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:21:31.973000 audit[2369]: AVC avc: denied { mac_admin } for pid=2369 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:31.973000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:21:31.973000 audit[2369]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000550180 a1=c000ceaee8 a2=c00069da10 a3=25 items=0 ppid=1 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:31.973000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:21:31.975976 kubelet[2369]: I1213 02:21:31.974762 2369 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:21:31.975976 kubelet[2369]: I1213 02:21:31.974845 2369 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:21:31.975976 kubelet[2369]: I1213 02:21:31.974916 2369 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:21:31.978000 audit[2379]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:31.978000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc9c30b0e0 a2=0 a3=7ffc9c30b0cc items=0 ppid=2369 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:31.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:21:31.979000 audit[2380]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:31.979000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd35208820 a2=0 a3=7ffd3520880c items=0 ppid=2369 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:31.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:21:31.982181 kubelet[2369]: E1213 02:21:31.981908 2369 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.18.8:6443/api/v1/namespaces/default/events\": dial tcp 172.31.18.8:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-18-8.18109b31282514b3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-18-8,UID:ip-172-31-18-8,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-18-8,},FirstTimestamp:2024-12-13 02:21:31.966862515 +0000 UTC m=+1.327085326,LastTimestamp:2024-12-13 02:21:31.966862515 +0000 UTC m=+1.327085326,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-18-8,}" Dec 13 02:21:31.987507 kubelet[2369]: I1213 02:21:31.987481 2369 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:21:31.987758 kubelet[2369]: E1213 02:21:31.987738 2369 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:21:31.988102 kubelet[2369]: E1213 02:21:31.988072 2369 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-8?timeout=10s\": dial tcp 172.31.18.8:6443: connect: connection refused" interval="200ms" Dec 13 02:21:31.988602 kubelet[2369]: I1213 02:21:31.988584 2369 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:21:31.988808 kubelet[2369]: I1213 02:21:31.988789 2369 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:21:31.988000 audit[2382]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:31.988000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe172e2620 a2=0 a3=7ffe172e260c items=0 ppid=2369 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:31.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:21:31.990684 kubelet[2369]: I1213 02:21:31.990667 2369 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:21:31.991691 kubelet[2369]: I1213 02:21:31.991668 2369 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:21:31.991765 kubelet[2369]: I1213 02:21:31.991737 2369 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:21:31.992000 audit[2384]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:31.992000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc107e9360 a2=0 a3=7ffc107e934c items=0 ppid=2369 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:31.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:21:32.012105 kubelet[2369]: W1213 02:21:32.012028 2369 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.18.8:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:32.012336 kubelet[2369]: E1213 02:21:32.012321 2369 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.18.8:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:32.027000 audit[2390]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:32.027000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff219c30e0 a2=0 a3=7fff219c30cc items=0 ppid=2369 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:32.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:21:32.029183 kubelet[2369]: I1213 02:21:32.029124 2369 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:21:32.038000 audit[2391]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:32.038000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc45cadf60 a2=0 a3=7ffc45cadf4c items=0 ppid=2369 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:32.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:21:32.042011 kubelet[2369]: I1213 02:21:32.041967 2369 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:21:32.042192 kubelet[2369]: I1213 02:21:32.042179 2369 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:21:32.042306 kubelet[2369]: I1213 02:21:32.042296 2369 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:21:32.042487 kubelet[2369]: E1213 02:21:32.042458 2369 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:21:32.041000 audit[2392]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:32.041000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffecd6409c0 a2=0 a3=7ffecd6409ac items=0 ppid=2369 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:32.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:21:32.048000 audit[2394]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:32.048000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcba05d550 a2=0 a3=7ffcba05d53c items=0 ppid=2369 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:32.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:21:32.050440 kubelet[2369]: W1213 02:21:32.050395 2369 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.18.8:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:32.050658 kubelet[2369]: E1213 02:21:32.050643 2369 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.18.8:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:32.051446 kubelet[2369]: I1213 02:21:32.051423 2369 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:21:32.051742 kubelet[2369]: I1213 02:21:32.051730 2369 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:21:32.051853 kubelet[2369]: I1213 02:21:32.051843 2369 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:21:32.055000 audit[2396]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:32.055000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc430d2c80 a2=0 a3=7ffc430d2c6c items=0 ppid=2369 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:32.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:21:32.056771 kubelet[2369]: I1213 02:21:32.056743 2369 policy_none.go:49] "None policy: Start" Dec 13 02:21:32.057000 audit[2395]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:32.057000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe15912190 a2=0 a3=10e3 items=0 ppid=2369 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:32.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:21:32.058559 kubelet[2369]: I1213 02:21:32.058546 2369 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:21:32.058628 kubelet[2369]: I1213 02:21:32.058573 2369 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:21:32.060000 audit[2399]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:32.060000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc91ecd2e0 a2=0 a3=7ffc91ecd2cc items=0 ppid=2369 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:32.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:21:32.062000 audit[2400]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:32.062000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc9d8e4680 a2=0 a3=7ffc9d8e466c items=0 ppid=2369 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:32.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:21:32.070256 systemd[1]: Created slice kubepods.slice. Dec 13 02:21:32.077101 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:21:32.081294 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:21:32.088313 kubelet[2369]: I1213 02:21:32.088278 2369 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:21:32.087000 audit[2369]: AVC avc: denied { mac_admin } for pid=2369 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:32.087000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:21:32.087000 audit[2369]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e64210 a1=c000e74360 a2=c000e641e0 a3=25 items=0 ppid=1 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:32.087000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:21:32.088766 kubelet[2369]: I1213 02:21:32.088415 2369 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:21:32.088766 kubelet[2369]: I1213 02:21:32.088601 2369 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:21:32.088880 kubelet[2369]: I1213 02:21:32.088809 2369 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:21:32.090611 kubelet[2369]: I1213 02:21:32.090585 2369 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-8" Dec 13 02:21:32.093112 kubelet[2369]: E1213 02:21:32.093075 2369 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.8:6443/api/v1/nodes\": dial tcp 172.31.18.8:6443: connect: connection refused" node="ip-172-31-18-8" Dec 13 02:21:32.093672 kubelet[2369]: E1213 02:21:32.093648 2369 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-18-8\" not found" Dec 13 02:21:32.145069 kubelet[2369]: I1213 02:21:32.144483 2369 topology_manager.go:215] "Topology Admit Handler" podUID="a956e3ae08740ce3507d7f25f27088c7" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-18-8" Dec 13 02:21:32.147274 kubelet[2369]: I1213 02:21:32.147224 2369 topology_manager.go:215] "Topology Admit Handler" podUID="4adc992f699058de9881a6cd269e29c9" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:32.151034 kubelet[2369]: I1213 02:21:32.150806 2369 topology_manager.go:215] "Topology Admit Handler" podUID="d16f782872b1d94161c8334eefb4d04f" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-18-8" Dec 13 02:21:32.157253 systemd[1]: Created slice kubepods-burstable-poda956e3ae08740ce3507d7f25f27088c7.slice. Dec 13 02:21:32.163797 systemd[1]: Created slice kubepods-burstable-pod4adc992f699058de9881a6cd269e29c9.slice. Dec 13 02:21:32.170150 systemd[1]: Created slice kubepods-burstable-podd16f782872b1d94161c8334eefb4d04f.slice. Dec 13 02:21:32.189306 kubelet[2369]: E1213 02:21:32.189253 2369 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-8?timeout=10s\": dial tcp 172.31.18.8:6443: connect: connection refused" interval="400ms" Dec 13 02:21:32.193117 kubelet[2369]: I1213 02:21:32.193081 2369 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a956e3ae08740ce3507d7f25f27088c7-ca-certs\") pod \"kube-apiserver-ip-172-31-18-8\" (UID: \"a956e3ae08740ce3507d7f25f27088c7\") " pod="kube-system/kube-apiserver-ip-172-31-18-8" Dec 13 02:21:32.193297 kubelet[2369]: I1213 02:21:32.193123 2369 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a956e3ae08740ce3507d7f25f27088c7-k8s-certs\") pod \"kube-apiserver-ip-172-31-18-8\" (UID: \"a956e3ae08740ce3507d7f25f27088c7\") " pod="kube-system/kube-apiserver-ip-172-31-18-8" Dec 13 02:21:32.193297 kubelet[2369]: I1213 02:21:32.193151 2369 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a956e3ae08740ce3507d7f25f27088c7-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-18-8\" (UID: \"a956e3ae08740ce3507d7f25f27088c7\") " pod="kube-system/kube-apiserver-ip-172-31-18-8" Dec 13 02:21:32.193297 kubelet[2369]: I1213 02:21:32.193174 2369 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4adc992f699058de9881a6cd269e29c9-ca-certs\") pod \"kube-controller-manager-ip-172-31-18-8\" (UID: \"4adc992f699058de9881a6cd269e29c9\") " pod="kube-system/kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:32.193297 kubelet[2369]: I1213 02:21:32.193199 2369 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4adc992f699058de9881a6cd269e29c9-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-18-8\" (UID: \"4adc992f699058de9881a6cd269e29c9\") " pod="kube-system/kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:32.193297 kubelet[2369]: I1213 02:21:32.193218 2369 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4adc992f699058de9881a6cd269e29c9-k8s-certs\") pod \"kube-controller-manager-ip-172-31-18-8\" (UID: \"4adc992f699058de9881a6cd269e29c9\") " pod="kube-system/kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:32.193494 kubelet[2369]: I1213 02:21:32.193245 2369 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4adc992f699058de9881a6cd269e29c9-kubeconfig\") pod \"kube-controller-manager-ip-172-31-18-8\" (UID: \"4adc992f699058de9881a6cd269e29c9\") " pod="kube-system/kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:32.193494 kubelet[2369]: I1213 02:21:32.193267 2369 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d16f782872b1d94161c8334eefb4d04f-kubeconfig\") pod \"kube-scheduler-ip-172-31-18-8\" (UID: \"d16f782872b1d94161c8334eefb4d04f\") " pod="kube-system/kube-scheduler-ip-172-31-18-8" Dec 13 02:21:32.193494 kubelet[2369]: I1213 02:21:32.193306 2369 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4adc992f699058de9881a6cd269e29c9-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-18-8\" (UID: \"4adc992f699058de9881a6cd269e29c9\") " pod="kube-system/kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:32.295869 kubelet[2369]: I1213 02:21:32.295826 2369 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-8" Dec 13 02:21:32.296562 kubelet[2369]: E1213 02:21:32.296527 2369 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.8:6443/api/v1/nodes\": dial tcp 172.31.18.8:6443: connect: connection refused" node="ip-172-31-18-8" Dec 13 02:21:32.463805 env[1740]: time="2024-12-13T02:21:32.463384261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-18-8,Uid:a956e3ae08740ce3507d7f25f27088c7,Namespace:kube-system,Attempt:0,}" Dec 13 02:21:32.469335 env[1740]: time="2024-12-13T02:21:32.469288837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-18-8,Uid:4adc992f699058de9881a6cd269e29c9,Namespace:kube-system,Attempt:0,}" Dec 13 02:21:32.479401 env[1740]: time="2024-12-13T02:21:32.479348351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-18-8,Uid:d16f782872b1d94161c8334eefb4d04f,Namespace:kube-system,Attempt:0,}" Dec 13 02:21:32.590191 kubelet[2369]: E1213 02:21:32.590130 2369 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-8?timeout=10s\": dial tcp 172.31.18.8:6443: connect: connection refused" interval="800ms" Dec 13 02:21:32.699366 kubelet[2369]: I1213 02:21:32.698947 2369 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-8" Dec 13 02:21:32.699366 kubelet[2369]: E1213 02:21:32.699336 2369 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.8:6443/api/v1/nodes\": dial tcp 172.31.18.8:6443: connect: connection refused" node="ip-172-31-18-8" Dec 13 02:21:32.809155 kubelet[2369]: W1213 02:21:32.808563 2369 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.18.8:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:32.809155 kubelet[2369]: E1213 02:21:32.808613 2369 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.18.8:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:33.030547 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2466816689.mount: Deactivated successfully. Dec 13 02:21:33.046490 env[1740]: time="2024-12-13T02:21:33.046436407Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.048532 env[1740]: time="2024-12-13T02:21:33.048487680Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.053315 env[1740]: time="2024-12-13T02:21:33.053266014Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.056337 env[1740]: time="2024-12-13T02:21:33.056292503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.058685 env[1740]: time="2024-12-13T02:21:33.058635181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.061513 env[1740]: time="2024-12-13T02:21:33.060989949Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.064698 env[1740]: time="2024-12-13T02:21:33.064649613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.066468 env[1740]: time="2024-12-13T02:21:33.066421352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.068402 env[1740]: time="2024-12-13T02:21:33.068285451Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.070123 env[1740]: time="2024-12-13T02:21:33.070085327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.073403 env[1740]: time="2024-12-13T02:21:33.073361400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.094200 env[1740]: time="2024-12-13T02:21:33.094147692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:33.118813 env[1740]: time="2024-12-13T02:21:33.118734458Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:21:33.119067 env[1740]: time="2024-12-13T02:21:33.119038588Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:21:33.119181 env[1740]: time="2024-12-13T02:21:33.119158784Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:21:33.119431 env[1740]: time="2024-12-13T02:21:33.119401741Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ecf39f5417781f82e9b0e5529ba99050b1a8762ab5a144667f6238fd394e5956 pid=2409 runtime=io.containerd.runc.v2 Dec 13 02:21:33.152916 kubelet[2369]: W1213 02:21:33.150550 2369 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.18.8:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:33.152916 kubelet[2369]: E1213 02:21:33.150606 2369 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.18.8:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:33.179873 systemd[1]: Started cri-containerd-ecf39f5417781f82e9b0e5529ba99050b1a8762ab5a144667f6238fd394e5956.scope. Dec 13 02:21:33.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.211000 audit: BPF prog-id=58 op=LOAD Dec 13 02:21:33.211000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.211000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2409 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663339663534313737383166383265396230653535323962613939 Dec 13 02:21:33.211000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.211000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2409 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663339663534313737383166383265396230653535323962613939 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit: BPF prog-id=59 op=LOAD Dec 13 02:21:33.212000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000282f20 items=0 ppid=2409 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663339663534313737383166383265396230653535323962613939 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit: BPF prog-id=60 op=LOAD Dec 13 02:21:33.212000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000282f68 items=0 ppid=2409 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663339663534313737383166383265396230653535323962613939 Dec 13 02:21:33.212000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:21:33.212000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.212000 audit: BPF prog-id=61 op=LOAD Dec 13 02:21:33.212000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000283378 items=0 ppid=2409 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663339663534313737383166383265396230653535323962613939 Dec 13 02:21:33.220624 kubelet[2369]: W1213 02:21:33.220530 2369 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.18.8:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:33.220624 kubelet[2369]: E1213 02:21:33.220586 2369 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.18.8:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:33.229153 env[1740]: time="2024-12-13T02:21:33.228963227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:21:33.229513 env[1740]: time="2024-12-13T02:21:33.229467356Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:21:33.229660 env[1740]: time="2024-12-13T02:21:33.229636456Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:21:33.230028 env[1740]: time="2024-12-13T02:21:33.229971396Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e46f25879824ed5bed1b6b156bf92091200d16ee23081bff88c084bc4485736 pid=2441 runtime=io.containerd.runc.v2 Dec 13 02:21:33.241489 env[1740]: time="2024-12-13T02:21:33.240903120Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:21:33.241489 env[1740]: time="2024-12-13T02:21:33.240968751Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:21:33.241489 env[1740]: time="2024-12-13T02:21:33.240983871Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:21:33.244241 env[1740]: time="2024-12-13T02:21:33.244059824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/984e8134388ef10670c91699aa168f873c10b6d72434b56db65e3adb74985beb pid=2455 runtime=io.containerd.runc.v2 Dec 13 02:21:33.275445 systemd[1]: Started cri-containerd-3e46f25879824ed5bed1b6b156bf92091200d16ee23081bff88c084bc4485736.scope. Dec 13 02:21:33.305202 systemd[1]: Started cri-containerd-984e8134388ef10670c91699aa168f873c10b6d72434b56db65e3adb74985beb.scope. Dec 13 02:21:33.311359 env[1740]: time="2024-12-13T02:21:33.311299959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-18-8,Uid:4adc992f699058de9881a6cd269e29c9,Namespace:kube-system,Attempt:0,} returns sandbox id \"ecf39f5417781f82e9b0e5529ba99050b1a8762ab5a144667f6238fd394e5956\"" Dec 13 02:21:33.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.326000 audit: BPF prog-id=62 op=LOAD Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2441 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365343666323538373938323465643562656431623662313536626639 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2441 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365343666323538373938323465643562656431623662313536626639 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit: BPF prog-id=63 op=LOAD Dec 13 02:21:33.331000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000255cd0 items=0 ppid=2441 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365343666323538373938323465643562656431623662313536626639 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.331000 audit: BPF prog-id=64 op=LOAD Dec 13 02:21:33.331000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000255d18 items=0 ppid=2441 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365343666323538373938323465643562656431623662313536626639 Dec 13 02:21:33.332000 audit: BPF prog-id=64 op=UNLOAD Dec 13 02:21:33.332000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:21:33.332000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.332000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.332000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.332000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.332000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.332000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.332000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.332000 audit[2469]: AVC avc: denied { perfmon } for pid=2469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.332000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.332000 audit[2469]: AVC avc: denied { bpf } for pid=2469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.332000 audit: BPF prog-id=65 op=LOAD Dec 13 02:21:33.332000 audit[2469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003da128 items=0 ppid=2441 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365343666323538373938323465643562656431623662313536626639 Dec 13 02:21:33.352383 env[1740]: time="2024-12-13T02:21:33.351693531Z" level=info msg="CreateContainer within sandbox \"ecf39f5417781f82e9b0e5529ba99050b1a8762ab5a144667f6238fd394e5956\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 02:21:33.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.362000 audit: BPF prog-id=66 op=LOAD Dec 13 02:21:33.365000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.365000 audit[2477]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2455 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938346538313334333838656631303637306339313639396161313638 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2455 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938346538313334333838656631303637306339313639396161313638 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit: BPF prog-id=67 op=LOAD Dec 13 02:21:33.366000 audit[2477]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001c9420 items=0 ppid=2455 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938346538313334333838656631303637306339313639396161313638 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit: BPF prog-id=68 op=LOAD Dec 13 02:21:33.366000 audit[2477]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001c9468 items=0 ppid=2455 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938346538313334333838656631303637306339313639396161313638 Dec 13 02:21:33.366000 audit: BPF prog-id=68 op=UNLOAD Dec 13 02:21:33.366000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.366000 audit: BPF prog-id=69 op=LOAD Dec 13 02:21:33.366000 audit[2477]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001c9878 items=0 ppid=2455 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938346538313334333838656631303637306339313639396161313638 Dec 13 02:21:33.391504 kubelet[2369]: E1213 02:21:33.391406 2369 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-8?timeout=10s\": dial tcp 172.31.18.8:6443: connect: connection refused" interval="1.6s" Dec 13 02:21:33.401260 env[1740]: time="2024-12-13T02:21:33.401192196Z" level=info msg="CreateContainer within sandbox \"ecf39f5417781f82e9b0e5529ba99050b1a8762ab5a144667f6238fd394e5956\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2f726aaf4148cfd5edfd96697a0b407beece927a1eb73bd1efd5deadae22ddca\"" Dec 13 02:21:33.402846 env[1740]: time="2024-12-13T02:21:33.402785662Z" level=info msg="StartContainer for \"2f726aaf4148cfd5edfd96697a0b407beece927a1eb73bd1efd5deadae22ddca\"" Dec 13 02:21:33.419882 env[1740]: time="2024-12-13T02:21:33.418114172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-18-8,Uid:a956e3ae08740ce3507d7f25f27088c7,Namespace:kube-system,Attempt:0,} returns sandbox id \"984e8134388ef10670c91699aa168f873c10b6d72434b56db65e3adb74985beb\"" Dec 13 02:21:33.430927 env[1740]: time="2024-12-13T02:21:33.430795827Z" level=info msg="CreateContainer within sandbox \"984e8134388ef10670c91699aa168f873c10b6d72434b56db65e3adb74985beb\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 02:21:33.435092 kubelet[2369]: W1213 02:21:33.434961 2369 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.18.8:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-8&limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:33.435092 kubelet[2369]: E1213 02:21:33.435046 2369 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.18.8:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-8&limit=500&resourceVersion=0": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:33.442147 systemd[1]: Started cri-containerd-2f726aaf4148cfd5edfd96697a0b407beece927a1eb73bd1efd5deadae22ddca.scope. Dec 13 02:21:33.484700 env[1740]: time="2024-12-13T02:21:33.484631507Z" level=info msg="CreateContainer within sandbox \"984e8134388ef10670c91699aa168f873c10b6d72434b56db65e3adb74985beb\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"24aeda34665e2d9fe45ae328faae4da3e1913234e56a4decd69b8788113b4f4e\"" Dec 13 02:21:33.486502 env[1740]: time="2024-12-13T02:21:33.486098752Z" level=info msg="StartContainer for \"24aeda34665e2d9fe45ae328faae4da3e1913234e56a4decd69b8788113b4f4e\"" Dec 13 02:21:33.494475 env[1740]: time="2024-12-13T02:21:33.494427841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-18-8,Uid:d16f782872b1d94161c8334eefb4d04f,Namespace:kube-system,Attempt:0,} returns sandbox id \"3e46f25879824ed5bed1b6b156bf92091200d16ee23081bff88c084bc4485736\"" Dec 13 02:21:33.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.497000 audit: BPF prog-id=70 op=LOAD Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2409 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266373236616166343134386366643565646664393636393761306234 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2409 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266373236616166343134386366643565646664393636393761306234 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.499000 audit: BPF prog-id=71 op=LOAD Dec 13 02:21:33.499000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025d90 items=0 ppid=2409 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266373236616166343134386366643565646664393636393761306234 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit: BPF prog-id=72 op=LOAD Dec 13 02:21:33.500000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025dd8 items=0 ppid=2409 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266373236616166343134386366643565646664393636393761306234 Dec 13 02:21:33.500000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:21:33.500000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.500000 audit: BPF prog-id=73 op=LOAD Dec 13 02:21:33.500000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003521e8 items=0 ppid=2409 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266373236616166343134386366643565646664393636393761306234 Dec 13 02:21:33.509373 kubelet[2369]: I1213 02:21:33.508916 2369 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-8" Dec 13 02:21:33.509373 kubelet[2369]: E1213 02:21:33.509328 2369 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.8:6443/api/v1/nodes\": dial tcp 172.31.18.8:6443: connect: connection refused" node="ip-172-31-18-8" Dec 13 02:21:33.510142 env[1740]: time="2024-12-13T02:21:33.510104074Z" level=info msg="CreateContainer within sandbox \"3e46f25879824ed5bed1b6b156bf92091200d16ee23081bff88c084bc4485736\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 02:21:33.536711 systemd[1]: Started cri-containerd-24aeda34665e2d9fe45ae328faae4da3e1913234e56a4decd69b8788113b4f4e.scope. Dec 13 02:21:33.550148 env[1740]: time="2024-12-13T02:21:33.550053945Z" level=info msg="CreateContainer within sandbox \"3e46f25879824ed5bed1b6b156bf92091200d16ee23081bff88c084bc4485736\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d9e6a4799b4908a64aa8dda1b0bae69db2a63df8976abcb954bf41e8d686253f\"" Dec 13 02:21:33.551122 env[1740]: time="2024-12-13T02:21:33.551076290Z" level=info msg="StartContainer for \"d9e6a4799b4908a64aa8dda1b0bae69db2a63df8976abcb954bf41e8d686253f\"" Dec 13 02:21:33.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.595000 audit: BPF prog-id=74 op=LOAD Dec 13 02:21:33.596000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.596000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2455 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234616564613334363635653264396665343561653332386661616534 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2455 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234616564613334363635653264396665343561653332386661616534 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit: BPF prog-id=75 op=LOAD Dec 13 02:21:33.597000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002211d0 items=0 ppid=2455 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234616564613334363635653264396665343561653332386661616534 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.597000 audit: BPF prog-id=76 op=LOAD Dec 13 02:21:33.597000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000221218 items=0 ppid=2455 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234616564613334363635653264396665343561653332386661616534 Dec 13 02:21:33.597000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:21:33.597000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:21:33.598000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.598000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.598000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.598000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.598000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.598000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.598000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.598000 audit[2561]: AVC avc: denied { perfmon } for pid=2561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.598000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.598000 audit[2561]: AVC avc: denied { bpf } for pid=2561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.598000 audit: BPF prog-id=77 op=LOAD Dec 13 02:21:33.598000 audit[2561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000221628 items=0 ppid=2455 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234616564613334363635653264396665343561653332386661616534 Dec 13 02:21:33.604728 env[1740]: time="2024-12-13T02:21:33.597206408Z" level=info msg="StartContainer for \"2f726aaf4148cfd5edfd96697a0b407beece927a1eb73bd1efd5deadae22ddca\" returns successfully" Dec 13 02:21:33.623138 systemd[1]: Started cri-containerd-d9e6a4799b4908a64aa8dda1b0bae69db2a63df8976abcb954bf41e8d686253f.scope. Dec 13 02:21:33.697596 env[1740]: time="2024-12-13T02:21:33.697505817Z" level=info msg="StartContainer for \"24aeda34665e2d9fe45ae328faae4da3e1913234e56a4decd69b8788113b4f4e\" returns successfully" Dec 13 02:21:33.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.713000 audit: BPF prog-id=78 op=LOAD Dec 13 02:21:33.715000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.715000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2441 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653661343739396234393038613634616138646461316230626165 Dec 13 02:21:33.715000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.715000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2441 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653661343739396234393038613634616138646461316230626165 Dec 13 02:21:33.716000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.716000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.716000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.716000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.716000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.716000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.716000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.716000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.716000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.716000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.716000 audit: BPF prog-id=79 op=LOAD Dec 13 02:21:33.716000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002bcd80 items=0 ppid=2441 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653661343739396234393038613634616138646461316230626165 Dec 13 02:21:33.717000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.717000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.717000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.717000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.717000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.717000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.717000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.717000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.717000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.717000 audit: BPF prog-id=80 op=LOAD Dec 13 02:21:33.717000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002bcdc8 items=0 ppid=2441 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653661343739396234393038613634616138646461316230626165 Dec 13 02:21:33.718000 audit: BPF prog-id=80 op=UNLOAD Dec 13 02:21:33.718000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:21:33.718000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.718000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.718000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.718000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.718000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.718000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.718000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.718000 audit[2585]: AVC avc: denied { perfmon } for pid=2585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.718000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.718000 audit[2585]: AVC avc: denied { bpf } for pid=2585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:33.718000 audit: BPF prog-id=81 op=LOAD Dec 13 02:21:33.718000 audit[2585]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002bd1d8 items=0 ppid=2441 pid=2585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:33.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439653661343739396234393038613634616138646461316230626165 Dec 13 02:21:33.781165 env[1740]: time="2024-12-13T02:21:33.781101496Z" level=info msg="StartContainer for \"d9e6a4799b4908a64aa8dda1b0bae69db2a63df8976abcb954bf41e8d686253f\" returns successfully" Dec 13 02:21:33.953408 kubelet[2369]: E1213 02:21:33.953267 2369 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.18.8:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.18.8:6443: connect: connection refused Dec 13 02:21:34.992450 kubelet[2369]: E1213 02:21:34.992372 2369 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-8?timeout=10s\": dial tcp 172.31.18.8:6443: connect: connection refused" interval="3.2s" Dec 13 02:21:35.032954 kubelet[2369]: E1213 02:21:35.032798 2369 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.18.8:6443/api/v1/namespaces/default/events\": dial tcp 172.31.18.8:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-18-8.18109b31282514b3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-18-8,UID:ip-172-31-18-8,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-18-8,},FirstTimestamp:2024-12-13 02:21:31.966862515 +0000 UTC m=+1.327085326,LastTimestamp:2024-12-13 02:21:31.966862515 +0000 UTC m=+1.327085326,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-18-8,}" Dec 13 02:21:35.111413 kubelet[2369]: I1213 02:21:35.111386 2369 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-8" Dec 13 02:21:35.112014 kubelet[2369]: E1213 02:21:35.111986 2369 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.8:6443/api/v1/nodes\": dial tcp 172.31.18.8:6443: connect: connection refused" node="ip-172-31-18-8" Dec 13 02:21:35.513951 kernel: kauditd_printk_skb: 516 callbacks suppressed Dec 13 02:21:35.514232 kernel: audit: type=1400 audit(1734056495.506:538): avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:35.506000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:35.506000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000058420 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:21:35.520851 kernel: audit: type=1300 audit(1734056495.506:538): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000058420 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:21:35.506000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:21:35.532517 kernel: audit: type=1327 audit(1734056495.506:538): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:21:35.532618 kernel: audit: type=1400 audit(1734056495.520:539): avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:35.520000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:35.520000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00051b2a0 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:21:35.543185 kernel: audit: type=1300 audit(1734056495.520:539): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00051b2a0 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:21:35.543281 kernel: audit: type=1327 audit(1734056495.520:539): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:21:35.520000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:21:36.661612 kernel: audit: type=1400 audit(1734056496.651:540): avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:36.661780 kernel: audit: type=1300 audit(1734056496.651:540): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005b55410 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:21:36.651000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:36.651000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005b55410 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:21:36.651000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:21:36.671122 kernel: audit: type=1327 audit(1734056496.651:540): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:21:36.671279 kernel: audit: type=1400 audit(1734056496.651:541): avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:36.651000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:36.651000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c008c9d740 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:21:36.651000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:21:36.655000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:36.655000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0071fa900 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:21:36.655000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:21:36.661000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:36.661000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=58 a1=c0071faa50 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:21:36.661000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:21:36.666000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:36.666000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c0044dda20 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:21:36.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:21:36.666000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:36.666000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=59 a1=c0071fac00 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:21:36.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:21:36.958619 kubelet[2369]: I1213 02:21:36.958452 2369 apiserver.go:52] "Watching apiserver" Dec 13 02:21:36.992566 kubelet[2369]: I1213 02:21:36.992515 2369 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:21:37.197589 kubelet[2369]: E1213 02:21:37.197555 2369 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-18-8" not found Dec 13 02:21:37.553944 kubelet[2369]: E1213 02:21:37.553907 2369 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-18-8" not found Dec 13 02:21:38.012975 kubelet[2369]: E1213 02:21:38.012936 2369 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-18-8" not found Dec 13 02:21:38.201552 kubelet[2369]: E1213 02:21:38.201513 2369 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-18-8\" not found" node="ip-172-31-18-8" Dec 13 02:21:38.315795 kubelet[2369]: I1213 02:21:38.315680 2369 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-8" Dec 13 02:21:38.328186 kubelet[2369]: I1213 02:21:38.328150 2369 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-18-8" Dec 13 02:21:39.141000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:39.141000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cb9b40 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:21:39.141000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:21:39.143000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:39.143000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cb9d00 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:21:39.143000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:21:39.145000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:39.145000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00100e660 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:21:39.145000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:21:39.146000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:21:39.146000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cb8020 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:21:39.146000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:21:39.614559 systemd[1]: Reloading. Dec 13 02:21:39.743376 /usr/lib/systemd/system-generators/torcx-generator[2660]: time="2024-12-13T02:21:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:21:39.743911 /usr/lib/systemd/system-generators/torcx-generator[2660]: time="2024-12-13T02:21:39Z" level=info msg="torcx already run" Dec 13 02:21:39.885634 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:21:39.885659 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:21:39.908425 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:21:40.014294 update_engine[1735]: I1213 02:21:40.013104 1735 update_attempter.cc:509] Updating boot flags... Dec 13 02:21:40.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.020000 audit: BPF prog-id=82 op=LOAD Dec 13 02:21:40.020000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:21:40.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.021000 audit: BPF prog-id=83 op=LOAD Dec 13 02:21:40.021000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:21:40.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit: BPF prog-id=84 op=LOAD Dec 13 02:21:40.024000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit: BPF prog-id=85 op=LOAD Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.025000 audit: BPF prog-id=86 op=LOAD Dec 13 02:21:40.025000 audit: BPF prog-id=45 op=UNLOAD Dec 13 02:21:40.025000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:21:40.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.027000 audit: BPF prog-id=87 op=LOAD Dec 13 02:21:40.027000 audit: BPF prog-id=47 op=UNLOAD Dec 13 02:21:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.029000 audit: BPF prog-id=88 op=LOAD Dec 13 02:21:40.029000 audit: BPF prog-id=48 op=UNLOAD Dec 13 02:21:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.031000 audit: BPF prog-id=89 op=LOAD Dec 13 02:21:40.031000 audit: BPF prog-id=49 op=UNLOAD Dec 13 02:21:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit: BPF prog-id=90 op=LOAD Dec 13 02:21:40.032000 audit: BPF prog-id=50 op=UNLOAD Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit: BPF prog-id=91 op=LOAD Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.032000 audit: BPF prog-id=92 op=LOAD Dec 13 02:21:40.032000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:21:40.032000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:21:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.033000 audit: BPF prog-id=93 op=LOAD Dec 13 02:21:40.033000 audit: BPF prog-id=58 op=UNLOAD Dec 13 02:21:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit: BPF prog-id=94 op=LOAD Dec 13 02:21:40.039000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit: BPF prog-id=95 op=LOAD Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit: BPF prog-id=96 op=LOAD Dec 13 02:21:40.039000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:21:40.039000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit: BPF prog-id=97 op=LOAD Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.040000 audit: BPF prog-id=98 op=LOAD Dec 13 02:21:40.040000 audit: BPF prog-id=56 op=UNLOAD Dec 13 02:21:40.040000 audit: BPF prog-id=57 op=UNLOAD Dec 13 02:21:40.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.041000 audit: BPF prog-id=99 op=LOAD Dec 13 02:21:40.041000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:21:40.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.044000 audit: BPF prog-id=100 op=LOAD Dec 13 02:21:40.044000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:21:40.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.046000 audit: BPF prog-id=101 op=LOAD Dec 13 02:21:40.046000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:21:40.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:40.047000 audit: BPF prog-id=102 op=LOAD Dec 13 02:21:40.048000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:21:40.088122 systemd[1]: Stopping kubelet.service... Dec 13 02:21:40.104730 kubelet[2369]: E1213 02:21:40.089580 2369 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{ip-172-31-18-8.18109b31282514b3 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-18-8,UID:ip-172-31-18-8,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-18-8,},FirstTimestamp:2024-12-13 02:21:31.966862515 +0000 UTC m=+1.327085326,LastTimestamp:2024-12-13 02:21:31.966862515 +0000 UTC m=+1.327085326,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-18-8,}" Dec 13 02:21:40.124360 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:21:40.124606 systemd[1]: Stopped kubelet.service. Dec 13 02:21:40.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:40.124754 systemd[1]: kubelet.service: Consumed 1.448s CPU time. Dec 13 02:21:40.127601 systemd[1]: Starting kubelet.service... Dec 13 02:21:41.682873 kernel: kauditd_printk_skb: 271 callbacks suppressed Dec 13 02:21:41.683025 kernel: audit: type=1130 audit(1734056501.674:795): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:41.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:41.674966 systemd[1]: Started kubelet.service. Dec 13 02:21:41.799311 kubelet[2815]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:21:41.799311 kubelet[2815]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:21:41.799311 kubelet[2815]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:21:41.800609 kubelet[2815]: I1213 02:21:41.800558 2815 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:21:41.809696 kubelet[2815]: I1213 02:21:41.809656 2815 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:21:41.809696 kubelet[2815]: I1213 02:21:41.809688 2815 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:21:41.810577 kubelet[2815]: I1213 02:21:41.810508 2815 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:21:41.814777 kubelet[2815]: I1213 02:21:41.814721 2815 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 02:21:41.821953 kubelet[2815]: I1213 02:21:41.818035 2815 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:21:41.847499 kubelet[2815]: I1213 02:21:41.847449 2815 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:21:41.848448 kubelet[2815]: I1213 02:21:41.848390 2815 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:21:41.848780 kubelet[2815]: I1213 02:21:41.848567 2815 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-18-8","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:21:41.849105 kubelet[2815]: I1213 02:21:41.849088 2815 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:21:41.849414 kubelet[2815]: I1213 02:21:41.849401 2815 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:21:41.849527 kubelet[2815]: I1213 02:21:41.849519 2815 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:21:41.849689 kubelet[2815]: I1213 02:21:41.849681 2815 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:21:41.855914 kubelet[2815]: I1213 02:21:41.855890 2815 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:21:41.856114 kubelet[2815]: I1213 02:21:41.856104 2815 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:21:41.860491 kubelet[2815]: I1213 02:21:41.860463 2815 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:21:41.865798 kubelet[2815]: I1213 02:21:41.865774 2815 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:21:41.875465 kubelet[2815]: I1213 02:21:41.875440 2815 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:21:41.876135 kubelet[2815]: I1213 02:21:41.876117 2815 server.go:1264] "Started kubelet" Dec 13 02:21:41.935105 kernel: audit: type=1400 audit(1734056501.925:796): avc: denied { mac_admin } for pid=2815 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:41.935294 kernel: audit: type=1401 audit(1734056501.925:796): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:21:41.925000 audit[2815]: AVC avc: denied { mac_admin } for pid=2815 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:41.925000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:21:41.940084 kubelet[2815]: I1213 02:21:41.940027 2815 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:21:41.942395 kubelet[2815]: I1213 02:21:41.942369 2815 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:21:41.925000 audit[2815]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a23ec0 a1=c0007ece88 a2=c000a23e90 a3=25 items=0 ppid=1 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:41.951014 kernel: audit: type=1300 audit(1734056501.925:796): arch=c000003e syscall=188 success=no exit=-22 a0=c000a23ec0 a1=c0007ece88 a2=c000a23e90 a3=25 items=0 ppid=1 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:41.951453 kubelet[2815]: I1213 02:21:41.951382 2815 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:21:41.925000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:21:41.958014 kernel: audit: type=1327 audit(1734056501.925:796): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:21:41.962993 kubelet[2815]: I1213 02:21:41.962968 2815 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:21:41.963194 kubelet[2815]: I1213 02:21:41.959891 2815 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:21:41.963374 kubelet[2815]: I1213 02:21:41.963356 2815 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:21:41.963473 kubelet[2815]: I1213 02:21:41.963464 2815 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:21:41.961000 audit[2815]: AVC avc: denied { mac_admin } for pid=2815 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:41.969428 kernel: audit: type=1400 audit(1734056501.961:797): avc: denied { mac_admin } for pid=2815 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:41.969531 kernel: audit: type=1401 audit(1734056501.961:797): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:21:41.961000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:21:41.976256 kernel: audit: type=1300 audit(1734056501.961:797): arch=c000003e syscall=188 success=no exit=-22 a0=c000a51cc0 a1=c0007ed1a0 a2=c000d83230 a3=25 items=0 ppid=1 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:41.961000 audit[2815]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a51cc0 a1=c0007ed1a0 a2=c000d83230 a3=25 items=0 ppid=1 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:41.982495 kernel: audit: type=1327 audit(1734056501.961:797): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:21:41.961000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:21:41.987616 kubelet[2815]: I1213 02:21:41.987584 2815 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:21:41.989301 kubelet[2815]: I1213 02:21:41.989277 2815 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:21:41.989571 kubelet[2815]: I1213 02:21:41.989562 2815 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:21:42.000814 kubelet[2815]: I1213 02:21:42.000774 2815 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:21:42.001186 kubelet[2815]: I1213 02:21:42.001156 2815 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:21:42.006300 kubelet[2815]: I1213 02:21:42.006256 2815 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:21:42.019860 kubelet[2815]: E1213 02:21:42.019813 2815 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:21:42.043468 kubelet[2815]: I1213 02:21:42.043423 2815 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:21:42.050410 kubelet[2815]: I1213 02:21:42.049553 2815 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:21:42.050410 kubelet[2815]: I1213 02:21:42.049622 2815 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:21:42.050410 kubelet[2815]: I1213 02:21:42.049647 2815 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:21:42.050410 kubelet[2815]: E1213 02:21:42.049709 2815 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:21:42.092410 kubelet[2815]: I1213 02:21:42.092383 2815 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-8" Dec 13 02:21:42.138674 kubelet[2815]: I1213 02:21:42.138639 2815 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:21:42.138956 kubelet[2815]: I1213 02:21:42.138932 2815 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:21:42.139124 kubelet[2815]: I1213 02:21:42.139110 2815 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:21:42.139640 kubelet[2815]: I1213 02:21:42.139613 2815 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 02:21:42.139796 kubelet[2815]: I1213 02:21:42.139760 2815 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 02:21:42.139906 kubelet[2815]: I1213 02:21:42.139897 2815 policy_none.go:49] "None policy: Start" Dec 13 02:21:42.141042 kubelet[2815]: I1213 02:21:42.141025 2815 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:21:42.141177 kubelet[2815]: I1213 02:21:42.141166 2815 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:21:42.141460 kubelet[2815]: I1213 02:21:42.141447 2815 state_mem.go:75] "Updated machine memory state" Dec 13 02:21:42.150018 kubelet[2815]: E1213 02:21:42.149981 2815 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 02:21:42.153365 kubelet[2815]: I1213 02:21:42.153341 2815 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-18-8" Dec 13 02:21:42.154596 kubelet[2815]: I1213 02:21:42.154578 2815 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-18-8" Dec 13 02:21:42.153000 audit[2815]: AVC avc: denied { mac_admin } for pid=2815 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:42.153000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:21:42.153000 audit[2815]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000eb2f90 a1=c00119caf8 a2=c000eb2f60 a3=25 items=0 ppid=1 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:42.153000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:21:42.164752 kubelet[2815]: I1213 02:21:42.153737 2815 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:21:42.164752 kubelet[2815]: I1213 02:21:42.155283 2815 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:21:42.164752 kubelet[2815]: I1213 02:21:42.155559 2815 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:21:42.164752 kubelet[2815]: I1213 02:21:42.155700 2815 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:21:42.164979 kernel: audit: type=1400 audit(1734056502.153:798): avc: denied { mac_admin } for pid=2815 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:42.351225 kubelet[2815]: I1213 02:21:42.351170 2815 topology_manager.go:215] "Topology Admit Handler" podUID="a956e3ae08740ce3507d7f25f27088c7" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-18-8" Dec 13 02:21:42.351603 kubelet[2815]: I1213 02:21:42.351399 2815 topology_manager.go:215] "Topology Admit Handler" podUID="4adc992f699058de9881a6cd269e29c9" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:42.352082 kubelet[2815]: I1213 02:21:42.352048 2815 topology_manager.go:215] "Topology Admit Handler" podUID="d16f782872b1d94161c8334eefb4d04f" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-18-8" Dec 13 02:21:42.399481 kubelet[2815]: I1213 02:21:42.399421 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4adc992f699058de9881a6cd269e29c9-ca-certs\") pod \"kube-controller-manager-ip-172-31-18-8\" (UID: \"4adc992f699058de9881a6cd269e29c9\") " pod="kube-system/kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:42.399481 kubelet[2815]: I1213 02:21:42.399479 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4adc992f699058de9881a6cd269e29c9-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-18-8\" (UID: \"4adc992f699058de9881a6cd269e29c9\") " pod="kube-system/kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:42.399864 kubelet[2815]: I1213 02:21:42.399512 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4adc992f699058de9881a6cd269e29c9-k8s-certs\") pod \"kube-controller-manager-ip-172-31-18-8\" (UID: \"4adc992f699058de9881a6cd269e29c9\") " pod="kube-system/kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:42.399864 kubelet[2815]: I1213 02:21:42.399539 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d16f782872b1d94161c8334eefb4d04f-kubeconfig\") pod \"kube-scheduler-ip-172-31-18-8\" (UID: \"d16f782872b1d94161c8334eefb4d04f\") " pod="kube-system/kube-scheduler-ip-172-31-18-8" Dec 13 02:21:42.399864 kubelet[2815]: I1213 02:21:42.399674 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a956e3ae08740ce3507d7f25f27088c7-k8s-certs\") pod \"kube-apiserver-ip-172-31-18-8\" (UID: \"a956e3ae08740ce3507d7f25f27088c7\") " pod="kube-system/kube-apiserver-ip-172-31-18-8" Dec 13 02:21:42.399864 kubelet[2815]: I1213 02:21:42.399700 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a956e3ae08740ce3507d7f25f27088c7-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-18-8\" (UID: \"a956e3ae08740ce3507d7f25f27088c7\") " pod="kube-system/kube-apiserver-ip-172-31-18-8" Dec 13 02:21:42.399864 kubelet[2815]: I1213 02:21:42.399722 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4adc992f699058de9881a6cd269e29c9-kubeconfig\") pod \"kube-controller-manager-ip-172-31-18-8\" (UID: \"4adc992f699058de9881a6cd269e29c9\") " pod="kube-system/kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:42.400139 kubelet[2815]: I1213 02:21:42.399745 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4adc992f699058de9881a6cd269e29c9-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-18-8\" (UID: \"4adc992f699058de9881a6cd269e29c9\") " pod="kube-system/kube-controller-manager-ip-172-31-18-8" Dec 13 02:21:42.400139 kubelet[2815]: I1213 02:21:42.399770 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a956e3ae08740ce3507d7f25f27088c7-ca-certs\") pod \"kube-apiserver-ip-172-31-18-8\" (UID: \"a956e3ae08740ce3507d7f25f27088c7\") " pod="kube-system/kube-apiserver-ip-172-31-18-8" Dec 13 02:21:42.862586 kubelet[2815]: I1213 02:21:42.862543 2815 apiserver.go:52] "Watching apiserver" Dec 13 02:21:42.890971 kubelet[2815]: I1213 02:21:42.890912 2815 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:21:43.113255 kubelet[2815]: E1213 02:21:43.113134 2815 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-18-8\" already exists" pod="kube-system/kube-apiserver-ip-172-31-18-8" Dec 13 02:21:43.158300 kubelet[2815]: I1213 02:21:43.158092 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-18-8" podStartSLOduration=1.15806655 podStartE2EDuration="1.15806655s" podCreationTimestamp="2024-12-13 02:21:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:21:43.129597165 +0000 UTC m=+1.432125583" watchObservedRunningTime="2024-12-13 02:21:43.15806655 +0000 UTC m=+1.460594969" Dec 13 02:21:43.177344 kubelet[2815]: I1213 02:21:43.177258 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-18-8" podStartSLOduration=1.177215811 podStartE2EDuration="1.177215811s" podCreationTimestamp="2024-12-13 02:21:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:21:43.160449788 +0000 UTC m=+1.462978211" watchObservedRunningTime="2024-12-13 02:21:43.177215811 +0000 UTC m=+1.479744227" Dec 13 02:21:43.177590 kubelet[2815]: I1213 02:21:43.177481 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-18-8" podStartSLOduration=1.177470933 podStartE2EDuration="1.177470933s" podCreationTimestamp="2024-12-13 02:21:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:21:43.175016906 +0000 UTC m=+1.477545322" watchObservedRunningTime="2024-12-13 02:21:43.177470933 +0000 UTC m=+1.479999350" Dec 13 02:21:48.604247 sudo[2023]: pam_unix(sudo:session): session closed for user root Dec 13 02:21:48.602000 audit[2023]: USER_END pid=2023 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:48.608995 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 02:21:48.609389 kernel: audit: type=1106 audit(1734056508.602:799): pid=2023 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:48.606000 audit[2023]: CRED_DISP pid=2023 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:48.624137 kernel: audit: type=1104 audit(1734056508.606:800): pid=2023 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:21:48.642884 sshd[2020]: pam_unix(sshd:session): session closed for user core Dec 13 02:21:48.642000 audit[2020]: USER_END pid=2020 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:48.646000 audit[2020]: CRED_DISP pid=2020 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:48.650451 systemd[1]: sshd@6-172.31.18.8:22-139.178.68.195:48306.service: Deactivated successfully. Dec 13 02:21:48.652177 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:21:48.652654 systemd[1]: session-7.scope: Consumed 5.137s CPU time. Dec 13 02:21:48.655777 systemd-logind[1734]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:21:48.664013 kernel: audit: type=1106 audit(1734056508.642:801): pid=2020 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:48.664160 kernel: audit: type=1104 audit(1734056508.646:802): pid=2020 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:21:48.664351 kernel: audit: type=1131 audit(1734056508.648:803): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.18.8:22-139.178.68.195:48306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:48.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.18.8:22-139.178.68.195:48306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:21:48.658196 systemd-logind[1734]: Removed session 7. Dec 13 02:21:51.516000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:21:51.516000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000aec900 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:21:51.532905 kernel: audit: type=1400 audit(1734056511.516:804): avc: denied { watch } for pid=2541 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:21:51.533239 kernel: audit: type=1300 audit(1734056511.516:804): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000aec900 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:21:51.533325 kernel: audit: type=1327 audit(1734056511.516:804): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:21:51.516000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:21:52.505909 kubelet[2815]: I1213 02:21:52.505861 2815 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:21:52.507892 env[1740]: time="2024-12-13T02:21:52.507742734Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:21:52.508783 kubelet[2815]: I1213 02:21:52.508759 2815 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:21:52.896837 kubelet[2815]: I1213 02:21:52.896777 2815 topology_manager.go:215] "Topology Admit Handler" podUID="583e92a3-50fb-47e7-b0ab-38359dc8e477" podNamespace="kube-system" podName="kube-proxy-r8w7g" Dec 13 02:21:52.905181 systemd[1]: Created slice kubepods-besteffort-pod583e92a3_50fb_47e7_b0ab_38359dc8e477.slice. Dec 13 02:21:53.081000 kubelet[2815]: I1213 02:21:53.080949 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/583e92a3-50fb-47e7-b0ab-38359dc8e477-lib-modules\") pod \"kube-proxy-r8w7g\" (UID: \"583e92a3-50fb-47e7-b0ab-38359dc8e477\") " pod="kube-system/kube-proxy-r8w7g" Dec 13 02:21:53.081000 kubelet[2815]: I1213 02:21:53.081004 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/583e92a3-50fb-47e7-b0ab-38359dc8e477-xtables-lock\") pod \"kube-proxy-r8w7g\" (UID: \"583e92a3-50fb-47e7-b0ab-38359dc8e477\") " pod="kube-system/kube-proxy-r8w7g" Dec 13 02:21:53.081292 kubelet[2815]: I1213 02:21:53.081029 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/583e92a3-50fb-47e7-b0ab-38359dc8e477-kube-proxy\") pod \"kube-proxy-r8w7g\" (UID: \"583e92a3-50fb-47e7-b0ab-38359dc8e477\") " pod="kube-system/kube-proxy-r8w7g" Dec 13 02:21:53.081292 kubelet[2815]: I1213 02:21:53.081052 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kk8cw\" (UniqueName: \"kubernetes.io/projected/583e92a3-50fb-47e7-b0ab-38359dc8e477-kube-api-access-kk8cw\") pod \"kube-proxy-r8w7g\" (UID: \"583e92a3-50fb-47e7-b0ab-38359dc8e477\") " pod="kube-system/kube-proxy-r8w7g" Dec 13 02:21:53.204731 kubelet[2815]: E1213 02:21:53.204596 2815 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 02:21:53.204731 kubelet[2815]: E1213 02:21:53.204668 2815 projected.go:200] Error preparing data for projected volume kube-api-access-kk8cw for pod kube-system/kube-proxy-r8w7g: configmap "kube-root-ca.crt" not found Dec 13 02:21:53.204985 kubelet[2815]: E1213 02:21:53.204770 2815 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/583e92a3-50fb-47e7-b0ab-38359dc8e477-kube-api-access-kk8cw podName:583e92a3-50fb-47e7-b0ab-38359dc8e477 nodeName:}" failed. No retries permitted until 2024-12-13 02:21:53.70473983 +0000 UTC m=+12.007268256 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-kk8cw" (UniqueName: "kubernetes.io/projected/583e92a3-50fb-47e7-b0ab-38359dc8e477-kube-api-access-kk8cw") pod "kube-proxy-r8w7g" (UID: "583e92a3-50fb-47e7-b0ab-38359dc8e477") : configmap "kube-root-ca.crt" not found Dec 13 02:21:53.593100 kubelet[2815]: I1213 02:21:53.593061 2815 topology_manager.go:215] "Topology Admit Handler" podUID="20ffda97-56a3-460a-b651-6c4cdd0d8e59" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-gvp9w" Dec 13 02:21:53.600554 systemd[1]: Created slice kubepods-besteffort-pod20ffda97_56a3_460a_b651_6c4cdd0d8e59.slice. Dec 13 02:21:53.685239 kubelet[2815]: I1213 02:21:53.685192 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/20ffda97-56a3-460a-b651-6c4cdd0d8e59-var-lib-calico\") pod \"tigera-operator-7bc55997bb-gvp9w\" (UID: \"20ffda97-56a3-460a-b651-6c4cdd0d8e59\") " pod="tigera-operator/tigera-operator-7bc55997bb-gvp9w" Dec 13 02:21:53.786637 kubelet[2815]: I1213 02:21:53.786581 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qqns8\" (UniqueName: \"kubernetes.io/projected/20ffda97-56a3-460a-b651-6c4cdd0d8e59-kube-api-access-qqns8\") pod \"tigera-operator-7bc55997bb-gvp9w\" (UID: \"20ffda97-56a3-460a-b651-6c4cdd0d8e59\") " pod="tigera-operator/tigera-operator-7bc55997bb-gvp9w" Dec 13 02:21:53.816764 env[1740]: time="2024-12-13T02:21:53.816707486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r8w7g,Uid:583e92a3-50fb-47e7-b0ab-38359dc8e477,Namespace:kube-system,Attempt:0,}" Dec 13 02:21:53.853503 env[1740]: time="2024-12-13T02:21:53.851110243Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:21:53.853503 env[1740]: time="2024-12-13T02:21:53.851190968Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:21:53.853503 env[1740]: time="2024-12-13T02:21:53.851220969Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:21:53.853503 env[1740]: time="2024-12-13T02:21:53.851393435Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3fa8a10c5e43f3489a30fb52aa52312ec0dde22e61d44f23923f7e6f97b948bd pid=2898 runtime=io.containerd.runc.v2 Dec 13 02:21:53.886465 systemd[1]: Started cri-containerd-3fa8a10c5e43f3489a30fb52aa52312ec0dde22e61d44f23923f7e6f97b948bd.scope. Dec 13 02:21:53.914299 kernel: audit: type=1400 audit(1734056513.904:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.914444 kernel: audit: type=1400 audit(1734056513.904:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.918520 kernel: audit: type=1400 audit(1734056513.904:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.918745 env[1740]: time="2024-12-13T02:21:53.914681189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-gvp9w,Uid:20ffda97-56a3-460a-b651-6c4cdd0d8e59,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:21:53.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.922895 kernel: audit: type=1400 audit(1734056513.904:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.930294 kernel: audit: type=1400 audit(1734056513.904:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.931556 kernel: audit: type=1400 audit(1734056513.904:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.931603 kernel: audit: type=1400 audit(1734056513.904:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.940854 kernel: audit: type=1400 audit(1734056513.904:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.949130 kernel: audit: type=1400 audit(1734056513.904:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.949245 kernel: audit: type=1400 audit(1734056513.905:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.905000 audit: BPF prog-id=103 op=LOAD Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2898 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:53.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366613861313063356534336633343839613330666235326161353233 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2898 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:53.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366613861313063356534336633343839613330666235326161353233 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.909000 audit: BPF prog-id=104 op=LOAD Dec 13 02:21:53.909000 audit[2909]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00028b350 items=0 ppid=2898 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:53.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366613861313063356534336633343839613330666235326161353233 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit: BPF prog-id=105 op=LOAD Dec 13 02:21:53.917000 audit[2909]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00028b398 items=0 ppid=2898 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:53.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366613861313063356534336633343839613330666235326161353233 Dec 13 02:21:53.917000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:21:53.917000 audit: BPF prog-id=104 op=UNLOAD Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { perfmon } for pid=2909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit[2909]: AVC avc: denied { bpf } for pid=2909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:53.917000 audit: BPF prog-id=106 op=LOAD Dec 13 02:21:53.917000 audit[2909]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00028b7a8 items=0 ppid=2898 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:53.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366613861313063356534336633343839613330666235326161353233 Dec 13 02:21:53.974407 env[1740]: time="2024-12-13T02:21:53.973463156Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:21:53.974407 env[1740]: time="2024-12-13T02:21:53.973563873Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:21:53.974407 env[1740]: time="2024-12-13T02:21:53.973594700Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:21:53.974407 env[1740]: time="2024-12-13T02:21:53.973763388Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dbe0fc939cb90ee330d68fd360bedb811957046b6642003b3964e3bd7d673465 pid=2941 runtime=io.containerd.runc.v2 Dec 13 02:21:53.976449 env[1740]: time="2024-12-13T02:21:53.976396771Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r8w7g,Uid:583e92a3-50fb-47e7-b0ab-38359dc8e477,Namespace:kube-system,Attempt:0,} returns sandbox id \"3fa8a10c5e43f3489a30fb52aa52312ec0dde22e61d44f23923f7e6f97b948bd\"" Dec 13 02:21:53.983544 env[1740]: time="2024-12-13T02:21:53.983493633Z" level=info msg="CreateContainer within sandbox \"3fa8a10c5e43f3489a30fb52aa52312ec0dde22e61d44f23923f7e6f97b948bd\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:21:54.001497 systemd[1]: Started cri-containerd-dbe0fc939cb90ee330d68fd360bedb811957046b6642003b3964e3bd7d673465.scope. Dec 13 02:21:54.024976 env[1740]: time="2024-12-13T02:21:54.024901459Z" level=info msg="CreateContainer within sandbox \"3fa8a10c5e43f3489a30fb52aa52312ec0dde22e61d44f23923f7e6f97b948bd\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"835feac01dceb97611333cff3bb56bb569c8f6eb493891c6040b9eb97cb6e550\"" Dec 13 02:21:54.027194 env[1740]: time="2024-12-13T02:21:54.027147482Z" level=info msg="StartContainer for \"835feac01dceb97611333cff3bb56bb569c8f6eb493891c6040b9eb97cb6e550\"" Dec 13 02:21:54.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.036000 audit: BPF prog-id=107 op=LOAD Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2941 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462653066633933396362393065653333306436386664333630626564 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2941 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462653066633933396362393065653333306436386664333630626564 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit: BPF prog-id=108 op=LOAD Dec 13 02:21:54.038000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001d4d80 items=0 ppid=2941 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462653066633933396362393065653333306436386664333630626564 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit: BPF prog-id=109 op=LOAD Dec 13 02:21:54.038000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001d4dc8 items=0 ppid=2941 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462653066633933396362393065653333306436386664333630626564 Dec 13 02:21:54.038000 audit: BPF prog-id=109 op=UNLOAD Dec 13 02:21:54.038000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.038000 audit: BPF prog-id=110 op=LOAD Dec 13 02:21:54.038000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001d51d8 items=0 ppid=2941 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462653066633933396362393065653333306436386664333630626564 Dec 13 02:21:54.072366 systemd[1]: Started cri-containerd-835feac01dceb97611333cff3bb56bb569c8f6eb493891c6040b9eb97cb6e550.scope. Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe5f0f12a48 items=0 ppid=2898 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833356665616330316463656239373631313333336366663362623536 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit: BPF prog-id=111 op=LOAD Dec 13 02:21:54.110000 audit[2977]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003fe448 items=0 ppid=2898 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833356665616330316463656239373631313333336366663362623536 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit: BPF prog-id=112 op=LOAD Dec 13 02:21:54.110000 audit[2977]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003fe498 items=0 ppid=2898 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833356665616330316463656239373631313333336366663362623536 Dec 13 02:21:54.110000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:21:54.110000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { perfmon } for pid=2977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit[2977]: AVC avc: denied { bpf } for pid=2977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:54.110000 audit: BPF prog-id=113 op=LOAD Dec 13 02:21:54.110000 audit[2977]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003fe528 items=0 ppid=2898 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833356665616330316463656239373631313333336366663362623536 Dec 13 02:21:54.123625 env[1740]: time="2024-12-13T02:21:54.123217863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-gvp9w,Uid:20ffda97-56a3-460a-b651-6c4cdd0d8e59,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"dbe0fc939cb90ee330d68fd360bedb811957046b6642003b3964e3bd7d673465\"" Dec 13 02:21:54.127555 env[1740]: time="2024-12-13T02:21:54.127511635Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:21:54.149257 env[1740]: time="2024-12-13T02:21:54.149199611Z" level=info msg="StartContainer for \"835feac01dceb97611333cff3bb56bb569c8f6eb493891c6040b9eb97cb6e550\" returns successfully" Dec 13 02:21:54.821476 systemd[1]: run-containerd-runc-k8s.io-3fa8a10c5e43f3489a30fb52aa52312ec0dde22e61d44f23923f7e6f97b948bd-runc.8Fdkpv.mount: Deactivated successfully. Dec 13 02:21:54.844000 audit[3034]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=3034 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:54.844000 audit[3034]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc01a62e10 a2=0 a3=7ffc01a62dfc items=0 ppid=2987 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.844000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:21:54.846000 audit[3035]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=3035 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:54.846000 audit[3035]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5eba3010 a2=0 a3=7ffc5eba2ffc items=0 ppid=2987 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:21:54.847000 audit[3036]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=3036 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:54.847000 audit[3036]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd9bde050 a2=0 a3=7fffd9bde03c items=0 ppid=2987 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.847000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:21:54.849000 audit[3037]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=3037 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.849000 audit[3037]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff1e07470 a2=0 a3=7ffff1e0745c items=0 ppid=2987 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:21:54.851000 audit[3038]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=3038 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.851000 audit[3038]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe490803a0 a2=0 a3=7ffe4908038c items=0 ppid=2987 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:21:54.852000 audit[3039]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=3039 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.852000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffc4f0d30 a2=0 a3=7ffffc4f0d1c items=0 ppid=2987 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:21:54.957000 audit[3040]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3040 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.957000 audit[3040]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc9c22ba40 a2=0 a3=7ffc9c22ba2c items=0 ppid=2987 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.957000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:21:54.962000 audit[3042]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.962000 audit[3042]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff5f48a060 a2=0 a3=7fff5f48a04c items=0 ppid=2987 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:21:54.968000 audit[3045]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3045 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.968000 audit[3045]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff7acd2c80 a2=0 a3=7fff7acd2c6c items=0 ppid=2987 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:21:54.970000 audit[3046]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3046 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.970000 audit[3046]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6fdc7790 a2=0 a3=7fff6fdc777c items=0 ppid=2987 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:21:54.973000 audit[3048]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3048 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.973000 audit[3048]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdeb777770 a2=0 a3=7ffdeb77775c items=0 ppid=2987 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:21:54.975000 audit[3049]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3049 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.975000 audit[3049]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff068d2aa0 a2=0 a3=7fff068d2a8c items=0 ppid=2987 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:21:54.978000 audit[3051]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3051 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.978000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9183f640 a2=0 a3=7ffe9183f62c items=0 ppid=2987 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:21:54.984000 audit[3054]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3054 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.984000 audit[3054]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd3af5c070 a2=0 a3=7ffd3af5c05c items=0 ppid=2987 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:21:54.986000 audit[3055]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3055 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.986000 audit[3055]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0f16b0d0 a2=0 a3=7fff0f16b0bc items=0 ppid=2987 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:21:54.989000 audit[3057]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3057 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.989000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcee3fc240 a2=0 a3=7ffcee3fc22c items=0 ppid=2987 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:21:54.990000 audit[3058]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3058 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.990000 audit[3058]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe82f8ca40 a2=0 a3=7ffe82f8ca2c items=0 ppid=2987 pid=3058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:21:54.994000 audit[3060]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3060 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:54.994000 audit[3060]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea96ce910 a2=0 a3=7ffea96ce8fc items=0 ppid=2987 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:54.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:21:55.008000 audit[3063]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3063 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:55.008000 audit[3063]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc256e81b0 a2=0 a3=7ffc256e819c items=0 ppid=2987 pid=3063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:21:55.016000 audit[3066]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3066 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:55.016000 audit[3066]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc66cd7ad0 a2=0 a3=7ffc66cd7abc items=0 ppid=2987 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:21:55.018000 audit[3067]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3067 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:55.018000 audit[3067]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd39ec1f20 a2=0 a3=7ffd39ec1f0c items=0 ppid=2987 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:21:55.024000 audit[3069]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:55.024000 audit[3069]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd130fdea0 a2=0 a3=7ffd130fde8c items=0 ppid=2987 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:21:55.030000 audit[3072]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3072 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:55.030000 audit[3072]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc15adde80 a2=0 a3=7ffc15adde6c items=0 ppid=2987 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:21:55.032000 audit[3073]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:55.032000 audit[3073]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe250e2110 a2=0 a3=7ffe250e20fc items=0 ppid=2987 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:21:55.036000 audit[3075]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:21:55.036000 audit[3075]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffca0f55770 a2=0 a3=7ffca0f5575c items=0 ppid=2987 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:21:55.068000 audit[3081]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:21:55.068000 audit[3081]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffcdbf5b5d0 a2=0 a3=7ffcdbf5b5bc items=0 ppid=2987 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:21:55.099000 audit[3081]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:21:55.099000 audit[3081]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcdbf5b5d0 a2=0 a3=7ffcdbf5b5bc items=0 ppid=2987 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:21:55.106000 audit[3086]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3086 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.106000 audit[3086]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffee7191cf0 a2=0 a3=7ffee7191cdc items=0 ppid=2987 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:21:55.113000 audit[3088]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.113000 audit[3088]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd39582070 a2=0 a3=7ffd3958205c items=0 ppid=2987 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:21:55.122000 audit[3091]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3091 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.122000 audit[3091]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe31c45550 a2=0 a3=7ffe31c4553c items=0 ppid=2987 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:21:55.124000 audit[3092]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3092 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.124000 audit[3092]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3c8b9a50 a2=0 a3=7fff3c8b9a3c items=0 ppid=2987 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:21:55.131000 audit[3094]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.131000 audit[3094]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff3e5a18f0 a2=0 a3=7fff3e5a18dc items=0 ppid=2987 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:21:55.134000 audit[3095]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3095 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.134000 audit[3095]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffecbc60c40 a2=0 a3=7ffecbc60c2c items=0 ppid=2987 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.134000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:21:55.138000 audit[3097]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3097 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.138000 audit[3097]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed6080c60 a2=0 a3=7ffed6080c4c items=0 ppid=2987 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:21:55.149000 audit[3100]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3100 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.149000 audit[3100]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffeada87190 a2=0 a3=7ffeada8717c items=0 ppid=2987 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:21:55.151000 audit[3101]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3101 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.151000 audit[3101]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1d430e40 a2=0 a3=7ffc1d430e2c items=0 ppid=2987 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:21:55.160000 audit[3103]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.160000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9ec76110 a2=0 a3=7ffc9ec760fc items=0 ppid=2987 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:21:55.161000 audit[3104]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.161000 audit[3104]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca5ae5c10 a2=0 a3=7ffca5ae5bfc items=0 ppid=2987 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:21:55.166000 audit[3106]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.166000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdcdccb7d0 a2=0 a3=7ffdcdccb7bc items=0 ppid=2987 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:21:55.172000 audit[3109]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.172000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecc2d74c0 a2=0 a3=7ffecc2d74ac items=0 ppid=2987 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:21:55.181000 audit[3112]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3112 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.181000 audit[3112]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6c4e45c0 a2=0 a3=7fff6c4e45ac items=0 ppid=2987 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:21:55.183000 audit[3113]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.183000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff4dcb0e90 a2=0 a3=7fff4dcb0e7c items=0 ppid=2987 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:21:55.186000 audit[3115]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3115 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.186000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdb2daf2d0 a2=0 a3=7ffdb2daf2bc items=0 ppid=2987 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:21:55.191000 audit[3118]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3118 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.191000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdbcdf14f0 a2=0 a3=7ffdbcdf14dc items=0 ppid=2987 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:21:55.193000 audit[3119]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.193000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb607a610 a2=0 a3=7ffeb607a5fc items=0 ppid=2987 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:21:55.196000 audit[3121]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3121 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.196000 audit[3121]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd64a36b20 a2=0 a3=7ffd64a36b0c items=0 ppid=2987 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:21:55.198000 audit[3122]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3122 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.198000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8acb8c80 a2=0 a3=7ffe8acb8c6c items=0 ppid=2987 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:21:55.202000 audit[3124]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.202000 audit[3124]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8c0d2b80 a2=0 a3=7ffe8c0d2b6c items=0 ppid=2987 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:21:55.207000 audit[3127]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3127 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:21:55.207000 audit[3127]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc2f6c0df0 a2=0 a3=7ffc2f6c0ddc items=0 ppid=2987 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:21:55.211000 audit[3129]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:21:55.211000 audit[3129]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd9bacd250 a2=0 a3=7ffd9bacd23c items=0 ppid=2987 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.211000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:21:55.212000 audit[3129]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:21:55.212000 audit[3129]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd9bacd250 a2=0 a3=7ffd9bacd23c items=0 ppid=2987 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:55.212000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:21:58.139823 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1692242189.mount: Deactivated successfully. Dec 13 02:21:59.492487 env[1740]: time="2024-12-13T02:21:59.492436937Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:59.496104 env[1740]: time="2024-12-13T02:21:59.496056257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:59.498940 env[1740]: time="2024-12-13T02:21:59.498895295Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:59.501606 env[1740]: time="2024-12-13T02:21:59.501564676Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:21:59.502250 env[1740]: time="2024-12-13T02:21:59.502212919Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:21:59.506140 env[1740]: time="2024-12-13T02:21:59.506099848Z" level=info msg="CreateContainer within sandbox \"dbe0fc939cb90ee330d68fd360bedb811957046b6642003b3964e3bd7d673465\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:21:59.526940 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2026092337.mount: Deactivated successfully. Dec 13 02:21:59.537622 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1333593703.mount: Deactivated successfully. Dec 13 02:21:59.549895 env[1740]: time="2024-12-13T02:21:59.549822343Z" level=info msg="CreateContainer within sandbox \"dbe0fc939cb90ee330d68fd360bedb811957046b6642003b3964e3bd7d673465\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f4873c2916d1d315246c965155cfe9fd6f0995fdd516b95046aea8df03c0a129\"" Dec 13 02:21:59.551092 env[1740]: time="2024-12-13T02:21:59.550991758Z" level=info msg="StartContainer for \"f4873c2916d1d315246c965155cfe9fd6f0995fdd516b95046aea8df03c0a129\"" Dec 13 02:21:59.611729 systemd[1]: Started cri-containerd-f4873c2916d1d315246c965155cfe9fd6f0995fdd516b95046aea8df03c0a129.scope. Dec 13 02:21:59.645873 kernel: kauditd_printk_skb: 300 callbacks suppressed Dec 13 02:21:59.646349 kernel: audit: type=1400 audit(1734056519.642:898): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.660798 kernel: audit: type=1400 audit(1734056519.642:899): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.660975 kernel: audit: type=1400 audit(1734056519.642:900): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.665981 kernel: audit: type=1400 audit(1734056519.642:901): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.674650 kernel: audit: type=1400 audit(1734056519.642:902): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.674791 kernel: audit: type=1400 audit(1734056519.642:903): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.685209 kernel: audit: type=1400 audit(1734056519.642:904): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.685323 kernel: audit: type=1400 audit(1734056519.642:905): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.700984 kernel: audit: type=1400 audit(1734056519.642:906): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.714485 kernel: audit: type=1400 audit(1734056519.643:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.643000 audit: BPF prog-id=114 op=LOAD Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2941 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:59.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383733633239313664316433313532343663393635313535636665 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2941 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:59.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383733633239313664316433313532343663393635313535636665 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit: BPF prog-id=115 op=LOAD Dec 13 02:21:59.648000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000ddcf0 items=0 ppid=2941 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:59.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383733633239313664316433313532343663393635313535636665 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.648000 audit: BPF prog-id=116 op=LOAD Dec 13 02:21:59.648000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000ddd38 items=0 ppid=2941 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:59.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383733633239313664316433313532343663393635313535636665 Dec 13 02:21:59.648000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:21:59.650000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:21:59.650000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.650000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.650000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.650000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.650000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.650000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.650000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.650000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.650000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.650000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:21:59.650000 audit: BPF prog-id=117 op=LOAD Dec 13 02:21:59.650000 audit[3138]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00033a148 items=0 ppid=2941 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:21:59.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634383733633239313664316433313532343663393635313535636665 Dec 13 02:21:59.728921 env[1740]: time="2024-12-13T02:21:59.728786507Z" level=info msg="StartContainer for \"f4873c2916d1d315246c965155cfe9fd6f0995fdd516b95046aea8df03c0a129\" returns successfully" Dec 13 02:22:00.184120 kubelet[2815]: I1213 02:22:00.181668 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-r8w7g" podStartSLOduration=8.181639706 podStartE2EDuration="8.181639706s" podCreationTimestamp="2024-12-13 02:21:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:21:55.146177054 +0000 UTC m=+13.448705478" watchObservedRunningTime="2024-12-13 02:22:00.181639706 +0000 UTC m=+18.484168138" Dec 13 02:22:02.164535 kubelet[2815]: I1213 02:22:02.164429 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-gvp9w" podStartSLOduration=3.785439232 podStartE2EDuration="9.16441365s" podCreationTimestamp="2024-12-13 02:21:53 +0000 UTC" firstStartedPulling="2024-12-13 02:21:54.124629776 +0000 UTC m=+12.427158193" lastFinishedPulling="2024-12-13 02:21:59.503604198 +0000 UTC m=+17.806132611" observedRunningTime="2024-12-13 02:22:00.187554095 +0000 UTC m=+18.490082525" watchObservedRunningTime="2024-12-13 02:22:02.16441365 +0000 UTC m=+20.466942074" Dec 13 02:22:03.343000 audit[3174]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:03.343000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe42752670 a2=0 a3=7ffe4275265c items=0 ppid=2987 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:03.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:03.350000 audit[3174]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:03.350000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe42752670 a2=0 a3=0 items=0 ppid=2987 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:03.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:03.361000 audit[3176]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3176 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:03.361000 audit[3176]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffff8bd6ca0 a2=0 a3=7ffff8bd6c8c items=0 ppid=2987 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:03.361000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:03.366000 audit[3176]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3176 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:03.366000 audit[3176]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffff8bd6ca0 a2=0 a3=0 items=0 ppid=2987 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:03.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:03.583822 kubelet[2815]: I1213 02:22:03.583777 2815 topology_manager.go:215] "Topology Admit Handler" podUID="12114096-730d-4ed2-9eb1-e3a5a37c8e23" podNamespace="calico-system" podName="calico-typha-5cfc87dfcf-8bxlp" Dec 13 02:22:03.597187 systemd[1]: Created slice kubepods-besteffort-pod12114096_730d_4ed2_9eb1_e3a5a37c8e23.slice. Dec 13 02:22:03.686599 kubelet[2815]: I1213 02:22:03.686556 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/12114096-730d-4ed2-9eb1-e3a5a37c8e23-typha-certs\") pod \"calico-typha-5cfc87dfcf-8bxlp\" (UID: \"12114096-730d-4ed2-9eb1-e3a5a37c8e23\") " pod="calico-system/calico-typha-5cfc87dfcf-8bxlp" Dec 13 02:22:03.686788 kubelet[2815]: I1213 02:22:03.686611 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4n8cs\" (UniqueName: \"kubernetes.io/projected/12114096-730d-4ed2-9eb1-e3a5a37c8e23-kube-api-access-4n8cs\") pod \"calico-typha-5cfc87dfcf-8bxlp\" (UID: \"12114096-730d-4ed2-9eb1-e3a5a37c8e23\") " pod="calico-system/calico-typha-5cfc87dfcf-8bxlp" Dec 13 02:22:03.686788 kubelet[2815]: I1213 02:22:03.686641 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/12114096-730d-4ed2-9eb1-e3a5a37c8e23-tigera-ca-bundle\") pod \"calico-typha-5cfc87dfcf-8bxlp\" (UID: \"12114096-730d-4ed2-9eb1-e3a5a37c8e23\") " pod="calico-system/calico-typha-5cfc87dfcf-8bxlp" Dec 13 02:22:03.903293 env[1740]: time="2024-12-13T02:22:03.902022472Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5cfc87dfcf-8bxlp,Uid:12114096-730d-4ed2-9eb1-e3a5a37c8e23,Namespace:calico-system,Attempt:0,}" Dec 13 02:22:03.932929 kubelet[2815]: I1213 02:22:03.932890 2815 topology_manager.go:215] "Topology Admit Handler" podUID="1f478125-d86e-4b15-a55e-b5b9e8696dc4" podNamespace="calico-system" podName="calico-node-v9td6" Dec 13 02:22:03.937977 env[1740]: time="2024-12-13T02:22:03.937824796Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:22:03.938147 env[1740]: time="2024-12-13T02:22:03.937996269Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:22:03.938147 env[1740]: time="2024-12-13T02:22:03.938027948Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:22:03.938396 env[1740]: time="2024-12-13T02:22:03.938309157Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f296a7447f06bacc3f64a856815242cc2da0484111255b70432529ca5f6f676d pid=3186 runtime=io.containerd.runc.v2 Dec 13 02:22:03.941441 systemd[1]: Created slice kubepods-besteffort-pod1f478125_d86e_4b15_a55e_b5b9e8696dc4.slice. Dec 13 02:22:03.996346 systemd[1]: Started cri-containerd-f296a7447f06bacc3f64a856815242cc2da0484111255b70432529ca5f6f676d.scope. Dec 13 02:22:04.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.025000 audit: BPF prog-id=118 op=LOAD Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3186 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632393661373434376630366261636333663634613835363831353234 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3186 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632393661373434376630366261636333663634613835363831353234 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit: BPF prog-id=119 op=LOAD Dec 13 02:22:04.027000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00030bf80 items=0 ppid=3186 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632393661373434376630366261636333663634613835363831353234 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.027000 audit: BPF prog-id=120 op=LOAD Dec 13 02:22:04.027000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00030bfc8 items=0 ppid=3186 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632393661373434376630366261636333663634613835363831353234 Dec 13 02:22:04.027000 audit: BPF prog-id=120 op=UNLOAD Dec 13 02:22:04.027000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:22:04.028000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.028000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.028000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.028000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.028000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.028000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.028000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.028000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.028000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.028000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.028000 audit: BPF prog-id=121 op=LOAD Dec 13 02:22:04.028000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0004003d8 items=0 ppid=3186 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632393661373434376630366261636333663634613835363831353234 Dec 13 02:22:04.090087 kubelet[2815]: I1213 02:22:04.090040 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1f478125-d86e-4b15-a55e-b5b9e8696dc4-policysync\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090262 kubelet[2815]: I1213 02:22:04.090121 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1f478125-d86e-4b15-a55e-b5b9e8696dc4-node-certs\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090262 kubelet[2815]: I1213 02:22:04.090163 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7kcfs\" (UniqueName: \"kubernetes.io/projected/1f478125-d86e-4b15-a55e-b5b9e8696dc4-kube-api-access-7kcfs\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090262 kubelet[2815]: I1213 02:22:04.090194 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1f478125-d86e-4b15-a55e-b5b9e8696dc4-cni-log-dir\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090262 kubelet[2815]: I1213 02:22:04.090233 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1f478125-d86e-4b15-a55e-b5b9e8696dc4-tigera-ca-bundle\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090262 kubelet[2815]: I1213 02:22:04.090255 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1f478125-d86e-4b15-a55e-b5b9e8696dc4-var-lib-calico\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090590 kubelet[2815]: I1213 02:22:04.090278 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1f478125-d86e-4b15-a55e-b5b9e8696dc4-cni-bin-dir\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090590 kubelet[2815]: I1213 02:22:04.090322 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1f478125-d86e-4b15-a55e-b5b9e8696dc4-cni-net-dir\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090590 kubelet[2815]: I1213 02:22:04.090349 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1f478125-d86e-4b15-a55e-b5b9e8696dc4-xtables-lock\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090590 kubelet[2815]: I1213 02:22:04.090391 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1f478125-d86e-4b15-a55e-b5b9e8696dc4-flexvol-driver-host\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090590 kubelet[2815]: I1213 02:22:04.090419 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1f478125-d86e-4b15-a55e-b5b9e8696dc4-lib-modules\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.090818 kubelet[2815]: I1213 02:22:04.090458 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1f478125-d86e-4b15-a55e-b5b9e8696dc4-var-run-calico\") pod \"calico-node-v9td6\" (UID: \"1f478125-d86e-4b15-a55e-b5b9e8696dc4\") " pod="calico-system/calico-node-v9td6" Dec 13 02:22:04.092066 env[1740]: time="2024-12-13T02:22:04.092017028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5cfc87dfcf-8bxlp,Uid:12114096-730d-4ed2-9eb1-e3a5a37c8e23,Namespace:calico-system,Attempt:0,} returns sandbox id \"f296a7447f06bacc3f64a856815242cc2da0484111255b70432529ca5f6f676d\"" Dec 13 02:22:04.094685 env[1740]: time="2024-12-13T02:22:04.094646010Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:22:04.103598 kubelet[2815]: I1213 02:22:04.102940 2815 topology_manager.go:215] "Topology Admit Handler" podUID="b7822b25-c667-4562-ab76-c70c9147bb14" podNamespace="calico-system" podName="csi-node-driver-k56lm" Dec 13 02:22:04.103598 kubelet[2815]: E1213 02:22:04.103368 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k56lm" podUID="b7822b25-c667-4562-ab76-c70c9147bb14" Dec 13 02:22:04.192946 kubelet[2815]: E1213 02:22:04.192813 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.192946 kubelet[2815]: W1213 02:22:04.192866 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.192946 kubelet[2815]: E1213 02:22:04.192901 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.193255 kubelet[2815]: E1213 02:22:04.193113 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.193255 kubelet[2815]: W1213 02:22:04.193125 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.193255 kubelet[2815]: E1213 02:22:04.193138 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.193398 kubelet[2815]: E1213 02:22:04.193312 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.193398 kubelet[2815]: W1213 02:22:04.193322 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.193398 kubelet[2815]: E1213 02:22:04.193334 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.193543 kubelet[2815]: E1213 02:22:04.193536 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.193588 kubelet[2815]: W1213 02:22:04.193546 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.193588 kubelet[2815]: E1213 02:22:04.193558 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.196862 kubelet[2815]: E1213 02:22:04.194857 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.196862 kubelet[2815]: W1213 02:22:04.194877 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.196862 kubelet[2815]: E1213 02:22:04.194896 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.196862 kubelet[2815]: E1213 02:22:04.195115 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.196862 kubelet[2815]: W1213 02:22:04.195125 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.196862 kubelet[2815]: E1213 02:22:04.195138 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.196862 kubelet[2815]: E1213 02:22:04.195330 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.196862 kubelet[2815]: W1213 02:22:04.195338 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.196862 kubelet[2815]: E1213 02:22:04.195349 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.196862 kubelet[2815]: E1213 02:22:04.195539 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.197368 kubelet[2815]: W1213 02:22:04.195548 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.197368 kubelet[2815]: E1213 02:22:04.195559 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.197368 kubelet[2815]: E1213 02:22:04.195756 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.197368 kubelet[2815]: W1213 02:22:04.195766 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.197368 kubelet[2815]: E1213 02:22:04.195778 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.197368 kubelet[2815]: E1213 02:22:04.196301 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.197368 kubelet[2815]: W1213 02:22:04.196312 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.197368 kubelet[2815]: E1213 02:22:04.196325 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.201261 kubelet[2815]: E1213 02:22:04.201223 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.201261 kubelet[2815]: W1213 02:22:04.201255 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.201494 kubelet[2815]: E1213 02:22:04.201287 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.201699 kubelet[2815]: E1213 02:22:04.201679 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.201774 kubelet[2815]: W1213 02:22:04.201700 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.201774 kubelet[2815]: E1213 02:22:04.201720 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.206428 kubelet[2815]: E1213 02:22:04.206235 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.206428 kubelet[2815]: W1213 02:22:04.206260 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.206428 kubelet[2815]: E1213 02:22:04.206291 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.207949 kubelet[2815]: E1213 02:22:04.207918 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.207949 kubelet[2815]: W1213 02:22:04.207946 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.208116 kubelet[2815]: E1213 02:22:04.207978 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.208379 kubelet[2815]: E1213 02:22:04.208359 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.208379 kubelet[2815]: W1213 02:22:04.208379 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.208530 kubelet[2815]: E1213 02:22:04.208395 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.208624 kubelet[2815]: E1213 02:22:04.208608 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.208679 kubelet[2815]: W1213 02:22:04.208625 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.208679 kubelet[2815]: E1213 02:22:04.208640 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.210124 kubelet[2815]: E1213 02:22:04.210087 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.210124 kubelet[2815]: W1213 02:22:04.210114 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.210299 kubelet[2815]: E1213 02:22:04.210132 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.210386 kubelet[2815]: E1213 02:22:04.210371 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.210445 kubelet[2815]: W1213 02:22:04.210387 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.210445 kubelet[2815]: E1213 02:22:04.210419 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.211110 kubelet[2815]: E1213 02:22:04.210728 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.211110 kubelet[2815]: W1213 02:22:04.210741 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.211110 kubelet[2815]: E1213 02:22:04.210753 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.211315 kubelet[2815]: E1213 02:22:04.211120 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.211315 kubelet[2815]: W1213 02:22:04.211130 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.211315 kubelet[2815]: E1213 02:22:04.211143 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.211463 kubelet[2815]: E1213 02:22:04.211405 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.211463 kubelet[2815]: W1213 02:22:04.211416 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.211463 kubelet[2815]: E1213 02:22:04.211430 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.211680 kubelet[2815]: E1213 02:22:04.211665 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.211680 kubelet[2815]: W1213 02:22:04.211680 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.211783 kubelet[2815]: E1213 02:22:04.211693 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.212553 kubelet[2815]: E1213 02:22:04.212532 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.212553 kubelet[2815]: W1213 02:22:04.212551 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.212703 kubelet[2815]: E1213 02:22:04.212567 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.213607 kubelet[2815]: E1213 02:22:04.213571 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.213607 kubelet[2815]: W1213 02:22:04.213588 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.213607 kubelet[2815]: E1213 02:22:04.213605 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.214274 kubelet[2815]: E1213 02:22:04.213887 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.214274 kubelet[2815]: W1213 02:22:04.213899 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.214274 kubelet[2815]: E1213 02:22:04.213913 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.214435 kubelet[2815]: E1213 02:22:04.214143 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.214511 kubelet[2815]: W1213 02:22:04.214497 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.214619 kubelet[2815]: E1213 02:22:04.214573 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.215712 kubelet[2815]: E1213 02:22:04.215698 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.215903 kubelet[2815]: W1213 02:22:04.215887 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.216003 kubelet[2815]: E1213 02:22:04.215990 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.216479 kubelet[2815]: E1213 02:22:04.216442 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.216479 kubelet[2815]: W1213 02:22:04.216462 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.216479 kubelet[2815]: E1213 02:22:04.216478 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.219060 kubelet[2815]: E1213 02:22:04.219034 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.219410 kubelet[2815]: W1213 02:22:04.219390 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.219513 kubelet[2815]: E1213 02:22:04.219497 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.219812 kubelet[2815]: E1213 02:22:04.219801 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.219921 kubelet[2815]: W1213 02:22:04.219909 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.220009 kubelet[2815]: E1213 02:22:04.219997 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.220296 kubelet[2815]: E1213 02:22:04.220284 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.220400 kubelet[2815]: W1213 02:22:04.220388 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.220498 kubelet[2815]: E1213 02:22:04.220485 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.220899 kubelet[2815]: E1213 02:22:04.220886 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.220983 kubelet[2815]: W1213 02:22:04.220972 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.221052 kubelet[2815]: E1213 02:22:04.221038 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.221324 kubelet[2815]: E1213 02:22:04.221314 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.221414 kubelet[2815]: W1213 02:22:04.221403 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.221481 kubelet[2815]: E1213 02:22:04.221470 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.221744 kubelet[2815]: E1213 02:22:04.221735 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.222095 kubelet[2815]: W1213 02:22:04.222081 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.222171 kubelet[2815]: E1213 02:22:04.222161 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.222727 kubelet[2815]: E1213 02:22:04.222602 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.222925 kubelet[2815]: W1213 02:22:04.222815 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.223037 kubelet[2815]: E1213 02:22:04.223023 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.255123 env[1740]: time="2024-12-13T02:22:04.255069605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-v9td6,Uid:1f478125-d86e-4b15-a55e-b5b9e8696dc4,Namespace:calico-system,Attempt:0,}" Dec 13 02:22:04.290569 env[1740]: time="2024-12-13T02:22:04.290479679Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:22:04.290866 env[1740]: time="2024-12-13T02:22:04.290577488Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:22:04.290866 env[1740]: time="2024-12-13T02:22:04.290610736Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:22:04.291157 env[1740]: time="2024-12-13T02:22:04.291102931Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/41c89897cf36454372d477145e962fd33434900d6c20d29ec72f9c97a8882a47 pid=3267 runtime=io.containerd.runc.v2 Dec 13 02:22:04.294221 kubelet[2815]: E1213 02:22:04.294189 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.294221 kubelet[2815]: W1213 02:22:04.294220 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.294478 kubelet[2815]: E1213 02:22:04.294251 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.294478 kubelet[2815]: I1213 02:22:04.294296 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b7822b25-c667-4562-ab76-c70c9147bb14-socket-dir\") pod \"csi-node-driver-k56lm\" (UID: \"b7822b25-c667-4562-ab76-c70c9147bb14\") " pod="calico-system/csi-node-driver-k56lm" Dec 13 02:22:04.294649 kubelet[2815]: E1213 02:22:04.294631 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.294728 kubelet[2815]: W1213 02:22:04.294650 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.294728 kubelet[2815]: E1213 02:22:04.294677 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.294728 kubelet[2815]: I1213 02:22:04.294706 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cvk78\" (UniqueName: \"kubernetes.io/projected/b7822b25-c667-4562-ab76-c70c9147bb14-kube-api-access-cvk78\") pod \"csi-node-driver-k56lm\" (UID: \"b7822b25-c667-4562-ab76-c70c9147bb14\") " pod="calico-system/csi-node-driver-k56lm" Dec 13 02:22:04.294990 kubelet[2815]: E1213 02:22:04.294967 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.294990 kubelet[2815]: W1213 02:22:04.294983 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.295099 kubelet[2815]: E1213 02:22:04.295001 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.295099 kubelet[2815]: I1213 02:22:04.295028 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b7822b25-c667-4562-ab76-c70c9147bb14-kubelet-dir\") pod \"csi-node-driver-k56lm\" (UID: \"b7822b25-c667-4562-ab76-c70c9147bb14\") " pod="calico-system/csi-node-driver-k56lm" Dec 13 02:22:04.295292 kubelet[2815]: E1213 02:22:04.295274 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.295292 kubelet[2815]: W1213 02:22:04.295290 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.295404 kubelet[2815]: E1213 02:22:04.295307 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.295404 kubelet[2815]: I1213 02:22:04.295343 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b7822b25-c667-4562-ab76-c70c9147bb14-varrun\") pod \"csi-node-driver-k56lm\" (UID: \"b7822b25-c667-4562-ab76-c70c9147bb14\") " pod="calico-system/csi-node-driver-k56lm" Dec 13 02:22:04.295619 kubelet[2815]: E1213 02:22:04.295604 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.295694 kubelet[2815]: W1213 02:22:04.295620 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.295694 kubelet[2815]: E1213 02:22:04.295636 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.295694 kubelet[2815]: I1213 02:22:04.295659 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b7822b25-c667-4562-ab76-c70c9147bb14-registration-dir\") pod \"csi-node-driver-k56lm\" (UID: \"b7822b25-c667-4562-ab76-c70c9147bb14\") " pod="calico-system/csi-node-driver-k56lm" Dec 13 02:22:04.295950 kubelet[2815]: E1213 02:22:04.295934 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.296025 kubelet[2815]: W1213 02:22:04.295951 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.296077 kubelet[2815]: E1213 02:22:04.296057 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.296365 kubelet[2815]: E1213 02:22:04.296341 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.296365 kubelet[2815]: W1213 02:22:04.296360 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.296488 kubelet[2815]: E1213 02:22:04.296476 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.296622 kubelet[2815]: E1213 02:22:04.296610 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.296700 kubelet[2815]: W1213 02:22:04.296624 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.296756 kubelet[2815]: E1213 02:22:04.296722 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.296876 kubelet[2815]: E1213 02:22:04.296864 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.296956 kubelet[2815]: W1213 02:22:04.296877 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.297015 kubelet[2815]: E1213 02:22:04.296976 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.297115 kubelet[2815]: E1213 02:22:04.297103 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.297183 kubelet[2815]: W1213 02:22:04.297117 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.297245 kubelet[2815]: E1213 02:22:04.297198 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.297342 kubelet[2815]: E1213 02:22:04.297329 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.297408 kubelet[2815]: W1213 02:22:04.297342 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.297408 kubelet[2815]: E1213 02:22:04.297354 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.298590 kubelet[2815]: E1213 02:22:04.298573 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.298749 kubelet[2815]: W1213 02:22:04.298589 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.298749 kubelet[2815]: E1213 02:22:04.298672 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.298967 kubelet[2815]: E1213 02:22:04.298953 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.299046 kubelet[2815]: W1213 02:22:04.298969 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.299046 kubelet[2815]: E1213 02:22:04.298982 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.299196 kubelet[2815]: E1213 02:22:04.299190 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.299253 kubelet[2815]: W1213 02:22:04.299199 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.299253 kubelet[2815]: E1213 02:22:04.299212 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.299536 kubelet[2815]: E1213 02:22:04.299487 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.299536 kubelet[2815]: W1213 02:22:04.299499 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.299536 kubelet[2815]: E1213 02:22:04.299512 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.333204 systemd[1]: Started cri-containerd-41c89897cf36454372d477145e962fd33434900d6c20d29ec72f9c97a8882a47.scope. Dec 13 02:22:04.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit: BPF prog-id=122 op=LOAD Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3267 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431633839383937636633363435343337326434373731343565393632 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3267 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431633839383937636633363435343337326434373731343565393632 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit: BPF prog-id=123 op=LOAD Dec 13 02:22:04.362000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00034c100 items=0 ppid=3267 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431633839383937636633363435343337326434373731343565393632 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.362000 audit: BPF prog-id=124 op=LOAD Dec 13 02:22:04.362000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00034c148 items=0 ppid=3267 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431633839383937636633363435343337326434373731343565393632 Dec 13 02:22:04.363000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:22:04.363000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:22:04.363000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.363000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.363000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.363000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.363000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.363000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.363000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.363000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.363000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.363000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:04.363000 audit: BPF prog-id=125 op=LOAD Dec 13 02:22:04.363000 audit[3277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00034c558 items=0 ppid=3267 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431633839383937636633363435343337326434373731343565393632 Dec 13 02:22:04.388000 audit[3316]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3316 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:04.388000 audit[3316]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffc5cb62d20 a2=0 a3=7ffc5cb62d0c items=0 ppid=2987 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:04.390000 audit[3316]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3316 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:04.394336 env[1740]: time="2024-12-13T02:22:04.394291759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-v9td6,Uid:1f478125-d86e-4b15-a55e-b5b9e8696dc4,Namespace:calico-system,Attempt:0,} returns sandbox id \"41c89897cf36454372d477145e962fd33434900d6c20d29ec72f9c97a8882a47\"" Dec 13 02:22:04.390000 audit[3316]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc5cb62d20 a2=0 a3=0 items=0 ppid=2987 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:04.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:04.398068 kubelet[2815]: E1213 02:22:04.396546 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.398068 kubelet[2815]: W1213 02:22:04.396566 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.398068 kubelet[2815]: E1213 02:22:04.396590 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.398068 kubelet[2815]: E1213 02:22:04.396908 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.398068 kubelet[2815]: W1213 02:22:04.396920 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.398068 kubelet[2815]: E1213 02:22:04.396938 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.398068 kubelet[2815]: E1213 02:22:04.397208 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.398068 kubelet[2815]: W1213 02:22:04.397219 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.398068 kubelet[2815]: E1213 02:22:04.397236 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.398068 kubelet[2815]: E1213 02:22:04.397493 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.398573 kubelet[2815]: W1213 02:22:04.397504 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.398573 kubelet[2815]: E1213 02:22:04.397521 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.398573 kubelet[2815]: E1213 02:22:04.397771 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.398573 kubelet[2815]: W1213 02:22:04.397781 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.398573 kubelet[2815]: E1213 02:22:04.397795 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.399594 kubelet[2815]: E1213 02:22:04.398877 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.399594 kubelet[2815]: W1213 02:22:04.398895 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.399594 kubelet[2815]: E1213 02:22:04.398992 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.399594 kubelet[2815]: E1213 02:22:04.399176 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.399594 kubelet[2815]: W1213 02:22:04.399184 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.399594 kubelet[2815]: E1213 02:22:04.399268 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.399594 kubelet[2815]: E1213 02:22:04.399404 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.399594 kubelet[2815]: W1213 02:22:04.399411 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.399594 kubelet[2815]: E1213 02:22:04.399511 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.400553 kubelet[2815]: E1213 02:22:04.400112 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.400553 kubelet[2815]: W1213 02:22:04.400124 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.400553 kubelet[2815]: E1213 02:22:04.400217 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.400553 kubelet[2815]: E1213 02:22:04.400364 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.400553 kubelet[2815]: W1213 02:22:04.400374 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.400553 kubelet[2815]: E1213 02:22:04.400458 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.401172 kubelet[2815]: E1213 02:22:04.400923 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.401172 kubelet[2815]: W1213 02:22:04.400934 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.401172 kubelet[2815]: E1213 02:22:04.401023 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.401574 kubelet[2815]: E1213 02:22:04.401371 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.401574 kubelet[2815]: W1213 02:22:04.401383 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.401574 kubelet[2815]: E1213 02:22:04.401478 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.401902 kubelet[2815]: E1213 02:22:04.401791 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.401902 kubelet[2815]: W1213 02:22:04.401802 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.402134 kubelet[2815]: E1213 02:22:04.402034 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.402257 kubelet[2815]: E1213 02:22:04.402246 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.402402 kubelet[2815]: W1213 02:22:04.402316 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.402491 kubelet[2815]: E1213 02:22:04.402478 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.402701 kubelet[2815]: E1213 02:22:04.402691 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.402785 kubelet[2815]: W1213 02:22:04.402774 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.402958 kubelet[2815]: E1213 02:22:04.402946 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.403177 kubelet[2815]: E1213 02:22:04.403167 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.403265 kubelet[2815]: W1213 02:22:04.403253 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.403449 kubelet[2815]: E1213 02:22:04.403435 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.403682 kubelet[2815]: E1213 02:22:04.403672 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.403768 kubelet[2815]: W1213 02:22:04.403756 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.403988 kubelet[2815]: E1213 02:22:04.403969 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.404182 kubelet[2815]: E1213 02:22:04.404173 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.404276 kubelet[2815]: W1213 02:22:04.404264 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.404441 kubelet[2815]: E1213 02:22:04.404427 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.405824 kubelet[2815]: E1213 02:22:04.405775 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.406645 kubelet[2815]: W1213 02:22:04.406630 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.406863 kubelet[2815]: E1213 02:22:04.406847 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.407155 kubelet[2815]: E1213 02:22:04.407143 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.407371 kubelet[2815]: W1213 02:22:04.407356 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.407634 kubelet[2815]: E1213 02:22:04.407619 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.407953 kubelet[2815]: E1213 02:22:04.407941 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.408958 kubelet[2815]: W1213 02:22:04.408016 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.408958 kubelet[2815]: E1213 02:22:04.408155 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.408958 kubelet[2815]: E1213 02:22:04.408324 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.408958 kubelet[2815]: W1213 02:22:04.408334 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.408958 kubelet[2815]: E1213 02:22:04.408472 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.408958 kubelet[2815]: E1213 02:22:04.408623 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.408958 kubelet[2815]: W1213 02:22:04.408632 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.408958 kubelet[2815]: E1213 02:22:04.408744 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.409426 kubelet[2815]: E1213 02:22:04.409413 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.409574 kubelet[2815]: W1213 02:22:04.409559 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.410002 kubelet[2815]: E1213 02:22:04.409986 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.410582 kubelet[2815]: E1213 02:22:04.410569 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.410709 kubelet[2815]: W1213 02:22:04.410696 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.410812 kubelet[2815]: E1213 02:22:04.410798 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.444737 kubelet[2815]: E1213 02:22:04.444475 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:04.444737 kubelet[2815]: W1213 02:22:04.444504 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:04.444737 kubelet[2815]: E1213 02:22:04.444530 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:04.818461 systemd[1]: run-containerd-runc-k8s.io-f296a7447f06bacc3f64a856815242cc2da0484111255b70432529ca5f6f676d-runc.mowu8R.mount: Deactivated successfully. Dec 13 02:22:05.622489 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2232625318.mount: Deactivated successfully. Dec 13 02:22:06.051242 kubelet[2815]: E1213 02:22:06.051020 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k56lm" podUID="b7822b25-c667-4562-ab76-c70c9147bb14" Dec 13 02:22:06.924188 env[1740]: time="2024-12-13T02:22:06.924131465Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:06.931623 env[1740]: time="2024-12-13T02:22:06.931542630Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:06.934868 env[1740]: time="2024-12-13T02:22:06.934527128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:06.937073 env[1740]: time="2024-12-13T02:22:06.937027093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:06.937703 env[1740]: time="2024-12-13T02:22:06.937663139Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:22:06.942421 env[1740]: time="2024-12-13T02:22:06.942378187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:22:06.961975 env[1740]: time="2024-12-13T02:22:06.961929312Z" level=info msg="CreateContainer within sandbox \"f296a7447f06bacc3f64a856815242cc2da0484111255b70432529ca5f6f676d\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:22:06.985930 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3932674133.mount: Deactivated successfully. Dec 13 02:22:06.997642 env[1740]: time="2024-12-13T02:22:06.997438813Z" level=info msg="CreateContainer within sandbox \"f296a7447f06bacc3f64a856815242cc2da0484111255b70432529ca5f6f676d\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"edc579400bc829ef1a986cc6d707673b0eb9debe56ebf356045b06319afd8ba6\"" Dec 13 02:22:07.001425 env[1740]: time="2024-12-13T02:22:06.999227612Z" level=info msg="StartContainer for \"edc579400bc829ef1a986cc6d707673b0eb9debe56ebf356045b06319afd8ba6\"" Dec 13 02:22:07.029877 systemd[1]: Started cri-containerd-edc579400bc829ef1a986cc6d707673b0eb9debe56ebf356045b06319afd8ba6.scope. Dec 13 02:22:07.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.071958 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 02:22:07.072055 kernel: audit: type=1400 audit(1734056527.069:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078544 kernel: audit: type=1400 audit(1734056527.069:959): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.089528 kernel: audit: type=1400 audit(1734056527.077:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.089755 kernel: audit: type=1400 audit(1734056527.077:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.100246 kernel: audit: type=1400 audit(1734056527.077:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.100394 kernel: audit: type=1400 audit(1734056527.077:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.105080 kernel: audit: type=1400 audit(1734056527.077:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.108817 kernel: audit: type=1400 audit(1734056527.077:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.116970 kernel: audit: type=1400 audit(1734056527.077:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.117111 kernel: audit: type=1400 audit(1734056527.077:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.077000 audit: BPF prog-id=126 op=LOAD Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3186 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:07.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564633537393430306263383239656631613938366363366437303736 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3186 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:07.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564633537393430306263383239656631613938366363366437303736 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit: BPF prog-id=127 op=LOAD Dec 13 02:22:07.078000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8ec0 items=0 ppid=3186 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:07.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564633537393430306263383239656631613938366363366437303736 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit: BPF prog-id=128 op=LOAD Dec 13 02:22:07.078000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8f08 items=0 ppid=3186 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:07.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564633537393430306263383239656631613938366363366437303736 Dec 13 02:22:07.078000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:22:07.078000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:07.078000 audit: BPF prog-id=129 op=LOAD Dec 13 02:22:07.078000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c9318 items=0 ppid=3186 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:07.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564633537393430306263383239656631613938366363366437303736 Dec 13 02:22:07.192628 env[1740]: time="2024-12-13T02:22:07.192499446Z" level=info msg="StartContainer for \"edc579400bc829ef1a986cc6d707673b0eb9debe56ebf356045b06319afd8ba6\" returns successfully" Dec 13 02:22:08.051317 kubelet[2815]: E1213 02:22:08.051263 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k56lm" podUID="b7822b25-c667-4562-ab76-c70c9147bb14" Dec 13 02:22:08.264217 kubelet[2815]: E1213 02:22:08.264182 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.264462 kubelet[2815]: W1213 02:22:08.264442 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.264579 kubelet[2815]: E1213 02:22:08.264565 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.265002 kubelet[2815]: E1213 02:22:08.264982 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.265116 kubelet[2815]: W1213 02:22:08.265104 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.265217 kubelet[2815]: E1213 02:22:08.265205 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.265486 kubelet[2815]: E1213 02:22:08.265477 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.265691 kubelet[2815]: W1213 02:22:08.265674 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.265926 kubelet[2815]: E1213 02:22:08.265911 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.269117 kubelet[2815]: E1213 02:22:08.269090 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.269305 kubelet[2815]: W1213 02:22:08.269287 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.269404 kubelet[2815]: E1213 02:22:08.269389 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.269850 kubelet[2815]: E1213 02:22:08.269822 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.269988 kubelet[2815]: W1213 02:22:08.269973 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.270080 kubelet[2815]: E1213 02:22:08.270068 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.272103 kubelet[2815]: E1213 02:22:08.272086 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.272234 kubelet[2815]: W1213 02:22:08.272219 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.272366 kubelet[2815]: E1213 02:22:08.272321 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.274138 kubelet[2815]: E1213 02:22:08.274118 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.274484 kubelet[2815]: W1213 02:22:08.274467 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.274596 kubelet[2815]: E1213 02:22:08.274582 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.274906 kubelet[2815]: E1213 02:22:08.274895 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.274984 kubelet[2815]: W1213 02:22:08.274974 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.275059 kubelet[2815]: E1213 02:22:08.275049 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.275315 kubelet[2815]: E1213 02:22:08.275306 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.275535 kubelet[2815]: W1213 02:22:08.275522 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.275618 kubelet[2815]: E1213 02:22:08.275606 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.276000 kubelet[2815]: E1213 02:22:08.275988 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.276282 kubelet[2815]: W1213 02:22:08.276267 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.276377 kubelet[2815]: E1213 02:22:08.276366 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.278534 kubelet[2815]: E1213 02:22:08.278516 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.278711 kubelet[2815]: W1213 02:22:08.278645 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.279094 kubelet[2815]: E1213 02:22:08.279078 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.279744 kubelet[2815]: E1213 02:22:08.279731 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.279917 kubelet[2815]: W1213 02:22:08.279902 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.281438 kubelet[2815]: E1213 02:22:08.280002 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.282147 kubelet[2815]: E1213 02:22:08.282121 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.282264 kubelet[2815]: W1213 02:22:08.282251 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.282468 kubelet[2815]: E1213 02:22:08.282452 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.283231 kubelet[2815]: E1213 02:22:08.282858 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.283231 kubelet[2815]: W1213 02:22:08.282881 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.283231 kubelet[2815]: E1213 02:22:08.282896 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.283231 kubelet[2815]: E1213 02:22:08.283102 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.283231 kubelet[2815]: W1213 02:22:08.283111 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.283231 kubelet[2815]: E1213 02:22:08.283122 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.354448 kubelet[2815]: E1213 02:22:08.354246 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.354448 kubelet[2815]: W1213 02:22:08.354271 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.354448 kubelet[2815]: E1213 02:22:08.354294 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.355002 kubelet[2815]: E1213 02:22:08.354847 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.355002 kubelet[2815]: W1213 02:22:08.354864 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.355002 kubelet[2815]: E1213 02:22:08.354882 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.355306 kubelet[2815]: E1213 02:22:08.355295 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.355445 kubelet[2815]: W1213 02:22:08.355432 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.355524 kubelet[2815]: E1213 02:22:08.355512 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.355974 kubelet[2815]: E1213 02:22:08.355957 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.356088 kubelet[2815]: W1213 02:22:08.356076 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.356172 kubelet[2815]: E1213 02:22:08.356156 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.356457 kubelet[2815]: E1213 02:22:08.356445 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.356555 kubelet[2815]: W1213 02:22:08.356543 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.356636 kubelet[2815]: E1213 02:22:08.356624 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.356977 kubelet[2815]: E1213 02:22:08.356964 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.357074 kubelet[2815]: W1213 02:22:08.357063 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.357150 kubelet[2815]: E1213 02:22:08.357134 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.357507 kubelet[2815]: E1213 02:22:08.357495 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.357605 kubelet[2815]: W1213 02:22:08.357594 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.357811 kubelet[2815]: E1213 02:22:08.357792 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.358298 kubelet[2815]: E1213 02:22:08.357960 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.358414 kubelet[2815]: W1213 02:22:08.358402 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.358595 kubelet[2815]: E1213 02:22:08.358575 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.358737 kubelet[2815]: E1213 02:22:08.358728 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.358814 kubelet[2815]: W1213 02:22:08.358804 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.359113 kubelet[2815]: E1213 02:22:08.359093 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.359260 kubelet[2815]: E1213 02:22:08.359250 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.359373 kubelet[2815]: W1213 02:22:08.359359 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.359461 kubelet[2815]: E1213 02:22:08.359449 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.360211 kubelet[2815]: E1213 02:22:08.360196 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.360308 kubelet[2815]: W1213 02:22:08.360297 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.360383 kubelet[2815]: E1213 02:22:08.360372 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.361253 kubelet[2815]: E1213 02:22:08.361238 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.361364 kubelet[2815]: W1213 02:22:08.361350 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.361447 kubelet[2815]: E1213 02:22:08.361435 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.361774 kubelet[2815]: E1213 02:22:08.361762 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.361886 kubelet[2815]: W1213 02:22:08.361874 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.361961 kubelet[2815]: E1213 02:22:08.361950 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.362483 kubelet[2815]: E1213 02:22:08.362471 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.362578 kubelet[2815]: W1213 02:22:08.362567 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.362656 kubelet[2815]: E1213 02:22:08.362643 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.362963 kubelet[2815]: E1213 02:22:08.362952 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.363057 kubelet[2815]: W1213 02:22:08.363046 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.363138 kubelet[2815]: E1213 02:22:08.363127 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.363434 kubelet[2815]: E1213 02:22:08.363422 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.363526 kubelet[2815]: W1213 02:22:08.363514 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.363607 kubelet[2815]: E1213 02:22:08.363596 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.364020 kubelet[2815]: E1213 02:22:08.364007 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.364138 kubelet[2815]: W1213 02:22:08.364124 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.364272 kubelet[2815]: E1213 02:22:08.364257 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.364965 kubelet[2815]: E1213 02:22:08.364952 2815 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:22:08.365171 kubelet[2815]: W1213 02:22:08.365156 2815 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:22:08.365260 kubelet[2815]: E1213 02:22:08.365246 2815 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:22:08.518691 env[1740]: time="2024-12-13T02:22:08.518628945Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:08.522412 env[1740]: time="2024-12-13T02:22:08.522368353Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:08.525181 env[1740]: time="2024-12-13T02:22:08.525133971Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:08.527819 env[1740]: time="2024-12-13T02:22:08.527776368Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:08.530317 env[1740]: time="2024-12-13T02:22:08.528658578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:22:08.533969 env[1740]: time="2024-12-13T02:22:08.533926484Z" level=info msg="CreateContainer within sandbox \"41c89897cf36454372d477145e962fd33434900d6c20d29ec72f9c97a8882a47\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:22:08.562113 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2564298073.mount: Deactivated successfully. Dec 13 02:22:08.581045 env[1740]: time="2024-12-13T02:22:08.580992920Z" level=info msg="CreateContainer within sandbox \"41c89897cf36454372d477145e962fd33434900d6c20d29ec72f9c97a8882a47\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"648595a6a1494d563d0fb0d892f97106f67fecf4df6f9b8ec6d21d2a2a5c5f06\"" Dec 13 02:22:08.588945 env[1740]: time="2024-12-13T02:22:08.582357437Z" level=info msg="StartContainer for \"648595a6a1494d563d0fb0d892f97106f67fecf4df6f9b8ec6d21d2a2a5c5f06\"" Dec 13 02:22:08.634719 systemd[1]: Started cri-containerd-648595a6a1494d563d0fb0d892f97106f67fecf4df6f9b8ec6d21d2a2a5c5f06.scope. Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit[3420]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f2d9817e718 items=0 ppid=3267 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:08.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383539356136613134393464353633643066623064383932663937 Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.661000 audit: BPF prog-id=130 op=LOAD Dec 13 02:22:08.661000 audit[3420]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00028aaf8 items=0 ppid=3267 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:08.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383539356136613134393464353633643066623064383932663937 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit: BPF prog-id=131 op=LOAD Dec 13 02:22:08.662000 audit[3420]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00028ab48 items=0 ppid=3267 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:08.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383539356136613134393464353633643066623064383932663937 Dec 13 02:22:08.662000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:22:08.662000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { perfmon } for pid=3420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit[3420]: AVC avc: denied { bpf } for pid=3420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:08.662000 audit: BPF prog-id=132 op=LOAD Dec 13 02:22:08.662000 audit[3420]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00028abd8 items=0 ppid=3267 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:08.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383539356136613134393464353633643066623064383932663937 Dec 13 02:22:08.688122 env[1740]: time="2024-12-13T02:22:08.688063582Z" level=info msg="StartContainer for \"648595a6a1494d563d0fb0d892f97106f67fecf4df6f9b8ec6d21d2a2a5c5f06\" returns successfully" Dec 13 02:22:08.705431 systemd[1]: cri-containerd-648595a6a1494d563d0fb0d892f97106f67fecf4df6f9b8ec6d21d2a2a5c5f06.scope: Deactivated successfully. Dec 13 02:22:08.707000 audit: BPF prog-id=132 op=UNLOAD Dec 13 02:22:08.952414 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-648595a6a1494d563d0fb0d892f97106f67fecf4df6f9b8ec6d21d2a2a5c5f06-rootfs.mount: Deactivated successfully. Dec 13 02:22:09.161917 env[1740]: time="2024-12-13T02:22:09.161857726Z" level=info msg="shim disconnected" id=648595a6a1494d563d0fb0d892f97106f67fecf4df6f9b8ec6d21d2a2a5c5f06 Dec 13 02:22:09.161917 env[1740]: time="2024-12-13T02:22:09.161916375Z" level=warning msg="cleaning up after shim disconnected" id=648595a6a1494d563d0fb0d892f97106f67fecf4df6f9b8ec6d21d2a2a5c5f06 namespace=k8s.io Dec 13 02:22:09.162480 env[1740]: time="2024-12-13T02:22:09.161928817Z" level=info msg="cleaning up dead shim" Dec 13 02:22:09.173370 env[1740]: time="2024-12-13T02:22:09.173307267Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:22:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3460 runtime=io.containerd.runc.v2\n" Dec 13 02:22:09.228038 kubelet[2815]: I1213 02:22:09.226547 2815 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:22:09.232255 env[1740]: time="2024-12-13T02:22:09.232214216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:22:09.252419 kubelet[2815]: I1213 02:22:09.252347 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5cfc87dfcf-8bxlp" podStartSLOduration=3.407336825 podStartE2EDuration="6.252325595s" podCreationTimestamp="2024-12-13 02:22:03 +0000 UTC" firstStartedPulling="2024-12-13 02:22:04.093982113 +0000 UTC m=+22.396510535" lastFinishedPulling="2024-12-13 02:22:06.938970885 +0000 UTC m=+25.241499305" observedRunningTime="2024-12-13 02:22:08.273914386 +0000 UTC m=+26.576442809" watchObservedRunningTime="2024-12-13 02:22:09.252325595 +0000 UTC m=+27.554854024" Dec 13 02:22:10.051447 kubelet[2815]: E1213 02:22:10.051159 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k56lm" podUID="b7822b25-c667-4562-ab76-c70c9147bb14" Dec 13 02:22:12.052873 kubelet[2815]: E1213 02:22:12.051166 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k56lm" podUID="b7822b25-c667-4562-ab76-c70c9147bb14" Dec 13 02:22:14.051119 kubelet[2815]: E1213 02:22:14.051070 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k56lm" podUID="b7822b25-c667-4562-ab76-c70c9147bb14" Dec 13 02:22:15.132986 kubelet[2815]: I1213 02:22:15.132949 2815 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:22:15.309365 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 02:22:15.314880 kernel: audit: type=1325 audit(1734056535.289:983): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:15.315037 kernel: audit: type=1300 audit(1734056535.289:983): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffed1685540 a2=0 a3=7ffed168552c items=0 ppid=2987 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:15.315073 kernel: audit: type=1327 audit(1734056535.289:983): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:15.315110 kernel: audit: type=1325 audit(1734056535.308:984): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:15.289000 audit[3478]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:15.289000 audit[3478]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffed1685540 a2=0 a3=7ffed168552c items=0 ppid=2987 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:15.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:15.308000 audit[3478]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:15.327922 kernel: audit: type=1300 audit(1734056535.308:984): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffed1685540 a2=0 a3=7ffed168552c items=0 ppid=2987 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:15.308000 audit[3478]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffed1685540 a2=0 a3=7ffed168552c items=0 ppid=2987 pid=3478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:15.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:15.360722 kernel: audit: type=1327 audit(1734056535.308:984): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:15.431279 env[1740]: time="2024-12-13T02:22:15.430582846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:15.444495 env[1740]: time="2024-12-13T02:22:15.444432095Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:15.450221 env[1740]: time="2024-12-13T02:22:15.449949408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:15.454725 env[1740]: time="2024-12-13T02:22:15.454673310Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:15.455176 env[1740]: time="2024-12-13T02:22:15.455141213Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:22:15.459724 env[1740]: time="2024-12-13T02:22:15.459672757Z" level=info msg="CreateContainer within sandbox \"41c89897cf36454372d477145e962fd33434900d6c20d29ec72f9c97a8882a47\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:22:15.525452 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2425838315.mount: Deactivated successfully. Dec 13 02:22:15.535939 env[1740]: time="2024-12-13T02:22:15.535883323Z" level=info msg="CreateContainer within sandbox \"41c89897cf36454372d477145e962fd33434900d6c20d29ec72f9c97a8882a47\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ccb0b97bdf337cb5db677fa6198845a54ac5908311e1fec3c7c602f60f3a57b4\"" Dec 13 02:22:15.539286 env[1740]: time="2024-12-13T02:22:15.537205303Z" level=info msg="StartContainer for \"ccb0b97bdf337cb5db677fa6198845a54ac5908311e1fec3c7c602f60f3a57b4\"" Dec 13 02:22:15.589371 systemd[1]: Started cri-containerd-ccb0b97bdf337cb5db677fa6198845a54ac5908311e1fec3c7c602f60f3a57b4.scope. Dec 13 02:22:15.592440 systemd[1]: run-containerd-runc-k8s.io-ccb0b97bdf337cb5db677fa6198845a54ac5908311e1fec3c7c602f60f3a57b4-runc.qjXuxa.mount: Deactivated successfully. Dec 13 02:22:15.629000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.629000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f53883ea228 items=0 ppid=3267 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:15.647390 kernel: audit: type=1400 audit(1734056535.629:985): avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.648115 kernel: audit: type=1300 audit(1734056535.629:985): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f53883ea228 items=0 ppid=3267 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:15.648217 kernel: audit: type=1327 audit(1734056535.629:985): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623062393762646633333763623564623637376661363139383834 Dec 13 02:22:15.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623062393762646633333763623564623637376661363139383834 Dec 13 02:22:15.630000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.663091 kernel: audit: type=1400 audit(1734056535.630:986): avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.630000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.630000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.630000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.630000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.630000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.630000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.630000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.630000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.630000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.630000 audit: BPF prog-id=133 op=LOAD Dec 13 02:22:15.630000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00034ecb8 items=0 ppid=3267 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:15.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623062393762646633333763623564623637376661363139383834 Dec 13 02:22:15.636000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.636000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.636000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.636000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.636000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.636000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.636000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.636000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.636000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.636000 audit: BPF prog-id=134 op=LOAD Dec 13 02:22:15.636000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00034ed08 items=0 ppid=3267 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:15.636000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623062393762646633333763623564623637376661363139383834 Dec 13 02:22:15.657000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:22:15.657000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:22:15.657000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.657000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.657000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.657000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.657000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.657000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.657000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.657000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.657000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.657000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:15.657000 audit: BPF prog-id=135 op=LOAD Dec 13 02:22:15.657000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00034ed98 items=0 ppid=3267 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:15.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623062393762646633333763623564623637376661363139383834 Dec 13 02:22:15.686124 env[1740]: time="2024-12-13T02:22:15.685986180Z" level=info msg="StartContainer for \"ccb0b97bdf337cb5db677fa6198845a54ac5908311e1fec3c7c602f60f3a57b4\" returns successfully" Dec 13 02:22:16.050801 kubelet[2815]: E1213 02:22:16.050559 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-k56lm" podUID="b7822b25-c667-4562-ab76-c70c9147bb14" Dec 13 02:22:16.844114 env[1740]: time="2024-12-13T02:22:16.844022079Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:22:16.863467 systemd[1]: cri-containerd-ccb0b97bdf337cb5db677fa6198845a54ac5908311e1fec3c7c602f60f3a57b4.scope: Deactivated successfully. Dec 13 02:22:16.864000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:22:16.892132 kubelet[2815]: I1213 02:22:16.892091 2815 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:22:16.896268 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ccb0b97bdf337cb5db677fa6198845a54ac5908311e1fec3c7c602f60f3a57b4-rootfs.mount: Deactivated successfully. Dec 13 02:22:16.914815 env[1740]: time="2024-12-13T02:22:16.914758063Z" level=info msg="shim disconnected" id=ccb0b97bdf337cb5db677fa6198845a54ac5908311e1fec3c7c602f60f3a57b4 Dec 13 02:22:16.915626 env[1740]: time="2024-12-13T02:22:16.915132456Z" level=warning msg="cleaning up after shim disconnected" id=ccb0b97bdf337cb5db677fa6198845a54ac5908311e1fec3c7c602f60f3a57b4 namespace=k8s.io Dec 13 02:22:16.915626 env[1740]: time="2024-12-13T02:22:16.915155243Z" level=info msg="cleaning up dead shim" Dec 13 02:22:16.933709 env[1740]: time="2024-12-13T02:22:16.933650018Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:22:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3527 runtime=io.containerd.runc.v2\n" Dec 13 02:22:16.948175 kubelet[2815]: I1213 02:22:16.948131 2815 topology_manager.go:215] "Topology Admit Handler" podUID="d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff" podNamespace="kube-system" podName="coredns-7db6d8ff4d-5nh99" Dec 13 02:22:16.953616 kubelet[2815]: I1213 02:22:16.953575 2815 topology_manager.go:215] "Topology Admit Handler" podUID="402a696b-090d-4af6-a484-ec67cf641104" podNamespace="calico-system" podName="calico-kube-controllers-dbfb5f45c-8kkfd" Dec 13 02:22:16.957920 systemd[1]: Created slice kubepods-burstable-podd2ac8cbc_55b4_4f4b_a8ef_b2060cf295ff.slice. Dec 13 02:22:16.971184 systemd[1]: Created slice kubepods-besteffort-pod402a696b_090d_4af6_a484_ec67cf641104.slice. Dec 13 02:22:16.977548 kubelet[2815]: I1213 02:22:16.977503 2815 topology_manager.go:215] "Topology Admit Handler" podUID="7b2ece73-537c-4b92-90c7-5f2bf4bedeb6" podNamespace="kube-system" podName="coredns-7db6d8ff4d-t95v7" Dec 13 02:22:16.977748 kubelet[2815]: I1213 02:22:16.977737 2815 topology_manager.go:215] "Topology Admit Handler" podUID="217fa5a0-a100-45e7-acaa-349611b79451" podNamespace="calico-apiserver" podName="calico-apiserver-7f96ff6ddd-bnmxs" Dec 13 02:22:16.978040 kubelet[2815]: I1213 02:22:16.978001 2815 topology_manager.go:215] "Topology Admit Handler" podUID="3c02d7f4-63e8-4626-a30b-80b4b56398fd" podNamespace="calico-apiserver" podName="calico-apiserver-7f96ff6ddd-dvjdm" Dec 13 02:22:16.987797 systemd[1]: Created slice kubepods-besteffort-pod3c02d7f4_63e8_4626_a30b_80b4b56398fd.slice. Dec 13 02:22:17.002039 systemd[1]: Created slice kubepods-burstable-pod7b2ece73_537c_4b92_90c7_5f2bf4bedeb6.slice. Dec 13 02:22:17.016530 systemd[1]: Created slice kubepods-besteffort-pod217fa5a0_a100_45e7_acaa_349611b79451.slice. Dec 13 02:22:17.041182 kubelet[2815]: I1213 02:22:17.041138 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/402a696b-090d-4af6-a484-ec67cf641104-tigera-ca-bundle\") pod \"calico-kube-controllers-dbfb5f45c-8kkfd\" (UID: \"402a696b-090d-4af6-a484-ec67cf641104\") " pod="calico-system/calico-kube-controllers-dbfb5f45c-8kkfd" Dec 13 02:22:17.041424 kubelet[2815]: I1213 02:22:17.041197 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bzpz2\" (UniqueName: \"kubernetes.io/projected/402a696b-090d-4af6-a484-ec67cf641104-kube-api-access-bzpz2\") pod \"calico-kube-controllers-dbfb5f45c-8kkfd\" (UID: \"402a696b-090d-4af6-a484-ec67cf641104\") " pod="calico-system/calico-kube-controllers-dbfb5f45c-8kkfd" Dec 13 02:22:17.041424 kubelet[2815]: I1213 02:22:17.041234 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nzjxh\" (UniqueName: \"kubernetes.io/projected/7b2ece73-537c-4b92-90c7-5f2bf4bedeb6-kube-api-access-nzjxh\") pod \"coredns-7db6d8ff4d-t95v7\" (UID: \"7b2ece73-537c-4b92-90c7-5f2bf4bedeb6\") " pod="kube-system/coredns-7db6d8ff4d-t95v7" Dec 13 02:22:17.041566 kubelet[2815]: I1213 02:22:17.041422 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/217fa5a0-a100-45e7-acaa-349611b79451-calico-apiserver-certs\") pod \"calico-apiserver-7f96ff6ddd-bnmxs\" (UID: \"217fa5a0-a100-45e7-acaa-349611b79451\") " pod="calico-apiserver/calico-apiserver-7f96ff6ddd-bnmxs" Dec 13 02:22:17.041566 kubelet[2815]: I1213 02:22:17.041458 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-99t7h\" (UniqueName: \"kubernetes.io/projected/3c02d7f4-63e8-4626-a30b-80b4b56398fd-kube-api-access-99t7h\") pod \"calico-apiserver-7f96ff6ddd-dvjdm\" (UID: \"3c02d7f4-63e8-4626-a30b-80b4b56398fd\") " pod="calico-apiserver/calico-apiserver-7f96ff6ddd-dvjdm" Dec 13 02:22:17.042351 kubelet[2815]: I1213 02:22:17.042309 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff-config-volume\") pod \"coredns-7db6d8ff4d-5nh99\" (UID: \"d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff\") " pod="kube-system/coredns-7db6d8ff4d-5nh99" Dec 13 02:22:17.042480 kubelet[2815]: I1213 02:22:17.042367 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pccj8\" (UniqueName: \"kubernetes.io/projected/d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff-kube-api-access-pccj8\") pod \"coredns-7db6d8ff4d-5nh99\" (UID: \"d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff\") " pod="kube-system/coredns-7db6d8ff4d-5nh99" Dec 13 02:22:17.042480 kubelet[2815]: I1213 02:22:17.042398 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7b2ece73-537c-4b92-90c7-5f2bf4bedeb6-config-volume\") pod \"coredns-7db6d8ff4d-t95v7\" (UID: \"7b2ece73-537c-4b92-90c7-5f2bf4bedeb6\") " pod="kube-system/coredns-7db6d8ff4d-t95v7" Dec 13 02:22:17.042480 kubelet[2815]: I1213 02:22:17.042447 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/3c02d7f4-63e8-4626-a30b-80b4b56398fd-calico-apiserver-certs\") pod \"calico-apiserver-7f96ff6ddd-dvjdm\" (UID: \"3c02d7f4-63e8-4626-a30b-80b4b56398fd\") " pod="calico-apiserver/calico-apiserver-7f96ff6ddd-dvjdm" Dec 13 02:22:17.042707 kubelet[2815]: I1213 02:22:17.042480 2815 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-56pfl\" (UniqueName: \"kubernetes.io/projected/217fa5a0-a100-45e7-acaa-349611b79451-kube-api-access-56pfl\") pod \"calico-apiserver-7f96ff6ddd-bnmxs\" (UID: \"217fa5a0-a100-45e7-acaa-349611b79451\") " pod="calico-apiserver/calico-apiserver-7f96ff6ddd-bnmxs" Dec 13 02:22:17.256626 env[1740]: time="2024-12-13T02:22:17.256480529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:22:17.267013 env[1740]: time="2024-12-13T02:22:17.266280637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5nh99,Uid:d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff,Namespace:kube-system,Attempt:0,}" Dec 13 02:22:17.285022 env[1740]: time="2024-12-13T02:22:17.284463007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbfb5f45c-8kkfd,Uid:402a696b-090d-4af6-a484-ec67cf641104,Namespace:calico-system,Attempt:0,}" Dec 13 02:22:17.296007 env[1740]: time="2024-12-13T02:22:17.295961680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96ff6ddd-dvjdm,Uid:3c02d7f4-63e8-4626-a30b-80b4b56398fd,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:22:17.311240 env[1740]: time="2024-12-13T02:22:17.311189742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-t95v7,Uid:7b2ece73-537c-4b92-90c7-5f2bf4bedeb6,Namespace:kube-system,Attempt:0,}" Dec 13 02:22:17.322737 env[1740]: time="2024-12-13T02:22:17.322688034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96ff6ddd-bnmxs,Uid:217fa5a0-a100-45e7-acaa-349611b79451,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:22:17.659720 env[1740]: time="2024-12-13T02:22:17.659618223Z" level=error msg="Failed to destroy network for sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.660423 env[1740]: time="2024-12-13T02:22:17.660296759Z" level=error msg="encountered an error cleaning up failed sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.660548 env[1740]: time="2024-12-13T02:22:17.660453357Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96ff6ddd-dvjdm,Uid:3c02d7f4-63e8-4626-a30b-80b4b56398fd,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.662309 kubelet[2815]: E1213 02:22:17.661928 2815 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.662309 kubelet[2815]: E1213 02:22:17.662030 2815 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7f96ff6ddd-dvjdm" Dec 13 02:22:17.662309 kubelet[2815]: E1213 02:22:17.662110 2815 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7f96ff6ddd-dvjdm" Dec 13 02:22:17.662531 kubelet[2815]: E1213 02:22:17.662183 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7f96ff6ddd-dvjdm_calico-apiserver(3c02d7f4-63e8-4626-a30b-80b4b56398fd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7f96ff6ddd-dvjdm_calico-apiserver(3c02d7f4-63e8-4626-a30b-80b4b56398fd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7f96ff6ddd-dvjdm" podUID="3c02d7f4-63e8-4626-a30b-80b4b56398fd" Dec 13 02:22:17.685793 env[1740]: time="2024-12-13T02:22:17.685716415Z" level=error msg="Failed to destroy network for sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.686354 env[1740]: time="2024-12-13T02:22:17.686294002Z" level=error msg="encountered an error cleaning up failed sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.687296 env[1740]: time="2024-12-13T02:22:17.686390343Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-t95v7,Uid:7b2ece73-537c-4b92-90c7-5f2bf4bedeb6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.688141 kubelet[2815]: E1213 02:22:17.687657 2815 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.688141 kubelet[2815]: E1213 02:22:17.687728 2815 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-t95v7" Dec 13 02:22:17.688141 kubelet[2815]: E1213 02:22:17.687761 2815 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-t95v7" Dec 13 02:22:17.688342 kubelet[2815]: E1213 02:22:17.687822 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-t95v7_kube-system(7b2ece73-537c-4b92-90c7-5f2bf4bedeb6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-t95v7_kube-system(7b2ece73-537c-4b92-90c7-5f2bf4bedeb6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-t95v7" podUID="7b2ece73-537c-4b92-90c7-5f2bf4bedeb6" Dec 13 02:22:17.696988 env[1740]: time="2024-12-13T02:22:17.696913545Z" level=error msg="Failed to destroy network for sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.697504 env[1740]: time="2024-12-13T02:22:17.697452624Z" level=error msg="encountered an error cleaning up failed sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.697626 env[1740]: time="2024-12-13T02:22:17.697535270Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbfb5f45c-8kkfd,Uid:402a696b-090d-4af6-a484-ec67cf641104,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.697893 kubelet[2815]: E1213 02:22:17.697825 2815 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.697987 kubelet[2815]: E1213 02:22:17.697945 2815 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-dbfb5f45c-8kkfd" Dec 13 02:22:17.697987 kubelet[2815]: E1213 02:22:17.697973 2815 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-dbfb5f45c-8kkfd" Dec 13 02:22:17.698096 kubelet[2815]: E1213 02:22:17.698045 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-dbfb5f45c-8kkfd_calico-system(402a696b-090d-4af6-a484-ec67cf641104)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-dbfb5f45c-8kkfd_calico-system(402a696b-090d-4af6-a484-ec67cf641104)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-dbfb5f45c-8kkfd" podUID="402a696b-090d-4af6-a484-ec67cf641104" Dec 13 02:22:17.702190 env[1740]: time="2024-12-13T02:22:17.702135440Z" level=error msg="Failed to destroy network for sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.703271 env[1740]: time="2024-12-13T02:22:17.703224370Z" level=error msg="encountered an error cleaning up failed sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.703485 env[1740]: time="2024-12-13T02:22:17.703439339Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5nh99,Uid:d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.704275 kubelet[2815]: E1213 02:22:17.703960 2815 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.704275 kubelet[2815]: E1213 02:22:17.704088 2815 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-5nh99" Dec 13 02:22:17.704275 kubelet[2815]: E1213 02:22:17.704120 2815 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-5nh99" Dec 13 02:22:17.704503 kubelet[2815]: E1213 02:22:17.704196 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-5nh99_kube-system(d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-5nh99_kube-system(d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5nh99" podUID="d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff" Dec 13 02:22:17.713998 env[1740]: time="2024-12-13T02:22:17.713931700Z" level=error msg="Failed to destroy network for sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.714382 env[1740]: time="2024-12-13T02:22:17.714335235Z" level=error msg="encountered an error cleaning up failed sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.714476 env[1740]: time="2024-12-13T02:22:17.714415023Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96ff6ddd-bnmxs,Uid:217fa5a0-a100-45e7-acaa-349611b79451,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.714803 kubelet[2815]: E1213 02:22:17.714757 2815 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:17.714928 kubelet[2815]: E1213 02:22:17.714856 2815 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7f96ff6ddd-bnmxs" Dec 13 02:22:17.714928 kubelet[2815]: E1213 02:22:17.714893 2815 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7f96ff6ddd-bnmxs" Dec 13 02:22:17.715035 kubelet[2815]: E1213 02:22:17.714950 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7f96ff6ddd-bnmxs_calico-apiserver(217fa5a0-a100-45e7-acaa-349611b79451)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7f96ff6ddd-bnmxs_calico-apiserver(217fa5a0-a100-45e7-acaa-349611b79451)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7f96ff6ddd-bnmxs" podUID="217fa5a0-a100-45e7-acaa-349611b79451" Dec 13 02:22:18.063931 systemd[1]: Created slice kubepods-besteffort-podb7822b25_c667_4562_ab76_c70c9147bb14.slice. Dec 13 02:22:18.069957 env[1740]: time="2024-12-13T02:22:18.069894180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k56lm,Uid:b7822b25-c667-4562-ab76-c70c9147bb14,Namespace:calico-system,Attempt:0,}" Dec 13 02:22:18.236530 env[1740]: time="2024-12-13T02:22:18.236462801Z" level=error msg="Failed to destroy network for sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:18.242947 env[1740]: time="2024-12-13T02:22:18.240711152Z" level=error msg="encountered an error cleaning up failed sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:18.242947 env[1740]: time="2024-12-13T02:22:18.240811452Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k56lm,Uid:b7822b25-c667-4562-ab76-c70c9147bb14,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:18.243104 kubelet[2815]: E1213 02:22:18.241959 2815 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:18.243104 kubelet[2815]: E1213 02:22:18.242025 2815 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k56lm" Dec 13 02:22:18.243104 kubelet[2815]: E1213 02:22:18.242046 2815 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-k56lm" Dec 13 02:22:18.240135 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632-shm.mount: Deactivated successfully. Dec 13 02:22:18.243684 kubelet[2815]: E1213 02:22:18.242108 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-k56lm_calico-system(b7822b25-c667-4562-ab76-c70c9147bb14)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-k56lm_calico-system(b7822b25-c667-4562-ab76-c70c9147bb14)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k56lm" podUID="b7822b25-c667-4562-ab76-c70c9147bb14" Dec 13 02:22:18.258567 kubelet[2815]: I1213 02:22:18.258534 2815 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:18.260552 env[1740]: time="2024-12-13T02:22:18.260510438Z" level=info msg="StopPodSandbox for \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\"" Dec 13 02:22:18.263542 kubelet[2815]: I1213 02:22:18.263020 2815 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:18.264306 env[1740]: time="2024-12-13T02:22:18.264257922Z" level=info msg="StopPodSandbox for \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\"" Dec 13 02:22:18.266062 kubelet[2815]: I1213 02:22:18.266030 2815 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:18.267154 env[1740]: time="2024-12-13T02:22:18.267112229Z" level=info msg="StopPodSandbox for \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\"" Dec 13 02:22:18.270804 kubelet[2815]: I1213 02:22:18.270232 2815 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:18.271161 env[1740]: time="2024-12-13T02:22:18.270958739Z" level=info msg="StopPodSandbox for \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\"" Dec 13 02:22:18.273022 kubelet[2815]: I1213 02:22:18.272636 2815 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:18.273593 env[1740]: time="2024-12-13T02:22:18.273550235Z" level=info msg="StopPodSandbox for \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\"" Dec 13 02:22:18.275511 kubelet[2815]: I1213 02:22:18.275187 2815 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:18.279208 env[1740]: time="2024-12-13T02:22:18.279157067Z" level=info msg="StopPodSandbox for \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\"" Dec 13 02:22:18.497134 env[1740]: time="2024-12-13T02:22:18.497057286Z" level=error msg="StopPodSandbox for \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\" failed" error="failed to destroy network for sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:18.498178 kubelet[2815]: E1213 02:22:18.498111 2815 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:18.498323 kubelet[2815]: E1213 02:22:18.498223 2815 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5"} Dec 13 02:22:18.498379 kubelet[2815]: E1213 02:22:18.498321 2815 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7b2ece73-537c-4b92-90c7-5f2bf4bedeb6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:22:18.498573 kubelet[2815]: E1213 02:22:18.498378 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7b2ece73-537c-4b92-90c7-5f2bf4bedeb6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-t95v7" podUID="7b2ece73-537c-4b92-90c7-5f2bf4bedeb6" Dec 13 02:22:18.503001 env[1740]: time="2024-12-13T02:22:18.502901294Z" level=error msg="StopPodSandbox for \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\" failed" error="failed to destroy network for sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:18.504579 kubelet[2815]: E1213 02:22:18.504329 2815 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:18.504719 kubelet[2815]: E1213 02:22:18.504645 2815 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca"} Dec 13 02:22:18.504806 kubelet[2815]: E1213 02:22:18.504785 2815 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"402a696b-090d-4af6-a484-ec67cf641104\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:22:18.504932 kubelet[2815]: E1213 02:22:18.504858 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"402a696b-090d-4af6-a484-ec67cf641104\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-dbfb5f45c-8kkfd" podUID="402a696b-090d-4af6-a484-ec67cf641104" Dec 13 02:22:18.516580 env[1740]: time="2024-12-13T02:22:18.516473918Z" level=error msg="StopPodSandbox for \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\" failed" error="failed to destroy network for sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:18.517338 kubelet[2815]: E1213 02:22:18.517051 2815 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:18.517338 kubelet[2815]: E1213 02:22:18.517121 2815 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5"} Dec 13 02:22:18.517338 kubelet[2815]: E1213 02:22:18.517167 2815 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3c02d7f4-63e8-4626-a30b-80b4b56398fd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:22:18.517338 kubelet[2815]: E1213 02:22:18.517200 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3c02d7f4-63e8-4626-a30b-80b4b56398fd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7f96ff6ddd-dvjdm" podUID="3c02d7f4-63e8-4626-a30b-80b4b56398fd" Dec 13 02:22:18.578724 env[1740]: time="2024-12-13T02:22:18.578646859Z" level=error msg="StopPodSandbox for \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\" failed" error="failed to destroy network for sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:18.579499 kubelet[2815]: E1213 02:22:18.579225 2815 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:18.579499 kubelet[2815]: E1213 02:22:18.579292 2815 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563"} Dec 13 02:22:18.579499 kubelet[2815]: E1213 02:22:18.579421 2815 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"217fa5a0-a100-45e7-acaa-349611b79451\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:22:18.579499 kubelet[2815]: E1213 02:22:18.579458 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"217fa5a0-a100-45e7-acaa-349611b79451\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7f96ff6ddd-bnmxs" podUID="217fa5a0-a100-45e7-acaa-349611b79451" Dec 13 02:22:18.599712 env[1740]: time="2024-12-13T02:22:18.599646313Z" level=error msg="StopPodSandbox for \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\" failed" error="failed to destroy network for sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:18.600497 kubelet[2815]: E1213 02:22:18.600293 2815 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:18.600497 kubelet[2815]: E1213 02:22:18.600360 2815 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b"} Dec 13 02:22:18.601820 kubelet[2815]: E1213 02:22:18.601673 2815 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:22:18.601820 kubelet[2815]: E1213 02:22:18.601760 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-5nh99" podUID="d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff" Dec 13 02:22:18.608448 env[1740]: time="2024-12-13T02:22:18.608372232Z" level=error msg="StopPodSandbox for \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\" failed" error="failed to destroy network for sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:22:18.608946 kubelet[2815]: E1213 02:22:18.608747 2815 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:18.608946 kubelet[2815]: E1213 02:22:18.608809 2815 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632"} Dec 13 02:22:18.608946 kubelet[2815]: E1213 02:22:18.608873 2815 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b7822b25-c667-4562-ab76-c70c9147bb14\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:22:18.608946 kubelet[2815]: E1213 02:22:18.608906 2815 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b7822b25-c667-4562-ab76-c70c9147bb14\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-k56lm" podUID="b7822b25-c667-4562-ab76-c70c9147bb14" Dec 13 02:22:26.554727 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3973092612.mount: Deactivated successfully. Dec 13 02:22:26.608103 env[1740]: time="2024-12-13T02:22:26.608000896Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:26.611888 env[1740]: time="2024-12-13T02:22:26.611823113Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:26.614626 env[1740]: time="2024-12-13T02:22:26.614579972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:26.616961 env[1740]: time="2024-12-13T02:22:26.616915905Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:26.617643 env[1740]: time="2024-12-13T02:22:26.617607510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:22:26.663577 env[1740]: time="2024-12-13T02:22:26.663490690Z" level=info msg="CreateContainer within sandbox \"41c89897cf36454372d477145e962fd33434900d6c20d29ec72f9c97a8882a47\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:22:26.706798 env[1740]: time="2024-12-13T02:22:26.706727857Z" level=info msg="CreateContainer within sandbox \"41c89897cf36454372d477145e962fd33434900d6c20d29ec72f9c97a8882a47\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7deba822c9fa6781bde666befbe9494f39b2897668fa21642489e0d38d418dfe\"" Dec 13 02:22:26.710169 env[1740]: time="2024-12-13T02:22:26.710123429Z" level=info msg="StartContainer for \"7deba822c9fa6781bde666befbe9494f39b2897668fa21642489e0d38d418dfe\"" Dec 13 02:22:26.748264 systemd[1]: Started cri-containerd-7deba822c9fa6781bde666befbe9494f39b2897668fa21642489e0d38d418dfe.scope. Dec 13 02:22:26.783769 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 02:22:26.784905 kernel: audit: type=1400 audit(1734056546.772:992): avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.785387 kernel: audit: type=1300 audit(1734056546.772:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb3e4077688 items=0 ppid=3267 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.798185 kernel: audit: type=1327 audit(1734056546.772:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764656261383232633966613637383162646536363662656662653934 Dec 13 02:22:26.798382 kernel: audit: type=1400 audit(1734056546.772:993): avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.798491 kernel: audit: type=1400 audit(1734056546.772:993): avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb3e4077688 items=0 ppid=3267 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:26.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764656261383232633966613637383162646536363662656662653934 Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.809616 kernel: audit: type=1400 audit(1734056546.772:993): avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.809871 kernel: audit: type=1400 audit(1734056546.772:993): avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.814950 kernel: audit: type=1400 audit(1734056546.772:993): avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.823534 kernel: audit: type=1400 audit(1734056546.772:993): avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.828992 kernel: audit: type=1400 audit(1734056546.772:993): avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.772000 audit: BPF prog-id=136 op=LOAD Dec 13 02:22:26.772000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002186b8 items=0 ppid=3267 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:26.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764656261383232633966613637383162646536363662656662653934 Dec 13 02:22:26.777000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.777000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.777000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.777000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.777000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.777000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.777000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.777000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.777000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.777000 audit: BPF prog-id=137 op=LOAD Dec 13 02:22:26.777000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000218708 items=0 ppid=3267 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:26.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764656261383232633966613637383162646536363662656662653934 Dec 13 02:22:26.782000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:22:26.782000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:22:26.782000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.782000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.782000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.782000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.782000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.782000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.782000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.782000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.782000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.782000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:26.782000 audit: BPF prog-id=138 op=LOAD Dec 13 02:22:26.782000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000218798 items=0 ppid=3267 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:26.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764656261383232633966613637383162646536363662656662653934 Dec 13 02:22:26.832539 env[1740]: time="2024-12-13T02:22:26.832498597Z" level=info msg="StartContainer for \"7deba822c9fa6781bde666befbe9494f39b2897668fa21642489e0d38d418dfe\" returns successfully" Dec 13 02:22:27.245111 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:22:27.245938 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:22:27.498760 kubelet[2815]: I1213 02:22:27.483640 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-v9td6" podStartSLOduration=2.252264397 podStartE2EDuration="24.464695757s" podCreationTimestamp="2024-12-13 02:22:03 +0000 UTC" firstStartedPulling="2024-12-13 02:22:04.406337491 +0000 UTC m=+22.708865899" lastFinishedPulling="2024-12-13 02:22:26.618768854 +0000 UTC m=+44.921297259" observedRunningTime="2024-12-13 02:22:27.463874265 +0000 UTC m=+45.766402694" watchObservedRunningTime="2024-12-13 02:22:27.464695757 +0000 UTC m=+45.767224182" Dec 13 02:22:28.424446 systemd[1]: run-containerd-runc-k8s.io-7deba822c9fa6781bde666befbe9494f39b2897668fa21642489e0d38d418dfe-runc.PSXr0w.mount: Deactivated successfully. Dec 13 02:22:28.816000 audit[3998]: AVC avc: denied { write } for pid=3998 comm="tee" name="fd" dev="proc" ino=25391 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:28.816000 audit[3998]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc9aaba14 a2=241 a3=1b6 items=1 ppid=3964 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:28.816000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:22:28.816000 audit: PATH item=0 name="/dev/fd/63" inode=25388 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:28.816000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:28.855000 audit[4013]: AVC avc: denied { write } for pid=4013 comm="tee" name="fd" dev="proc" ino=25755 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:28.855000 audit[4013]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcad4e5a24 a2=241 a3=1b6 items=1 ppid=3970 pid=4013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:28.855000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:22:28.855000 audit: PATH item=0 name="/dev/fd/63" inode=25409 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:28.855000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:28.868000 audit[4010]: AVC avc: denied { write } for pid=4010 comm="tee" name="fd" dev="proc" ino=25761 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:28.868000 audit[4010]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff611bfa26 a2=241 a3=1b6 items=1 ppid=3962 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:28.868000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:22:28.868000 audit: PATH item=0 name="/dev/fd/63" inode=25750 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:28.868000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:28.881000 audit[4006]: AVC avc: denied { write } for pid=4006 comm="tee" name="fd" dev="proc" ino=25418 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:28.881000 audit[4006]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8507ea24 a2=241 a3=1b6 items=1 ppid=3967 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:28.881000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:22:28.881000 audit: PATH item=0 name="/dev/fd/63" inode=25745 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:28.881000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:28.897000 audit[4023]: AVC avc: denied { write } for pid=4023 comm="tee" name="fd" dev="proc" ino=25767 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:28.897000 audit[4023]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb9543a24 a2=241 a3=1b6 items=1 ppid=3972 pid=4023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:28.897000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:22:28.897000 audit: PATH item=0 name="/dev/fd/63" inode=25413 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:28.897000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:28.907000 audit[4030]: AVC avc: denied { write } for pid=4030 comm="tee" name="fd" dev="proc" ino=25771 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:28.939000 audit[4040]: AVC avc: denied { write } for pid=4040 comm="tee" name="fd" dev="proc" ino=25431 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:22:28.939000 audit[4040]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc22988a25 a2=241 a3=1b6 items=1 ppid=3974 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:28.939000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:22:28.939000 audit: PATH item=0 name="/dev/fd/63" inode=25775 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:28.939000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:28.907000 audit[4030]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc339bca15 a2=241 a3=1b6 items=1 ppid=3966 pid=4030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:28.907000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:22:28.907000 audit: PATH item=0 name="/dev/fd/63" inode=25764 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:22:28.907000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:22:29.383274 systemd[1]: run-containerd-runc-k8s.io-7deba822c9fa6781bde666befbe9494f39b2897668fa21642489e0d38d418dfe-runc.vTKnqC.mount: Deactivated successfully. Dec 13 02:22:29.395000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.395000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.395000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.395000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.395000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.395000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.395000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.395000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.395000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.395000 audit: BPF prog-id=139 op=LOAD Dec 13 02:22:29.395000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff871cf280 a2=98 a3=3 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.395000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.397000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:22:29.398000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.398000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.398000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.398000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.398000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.398000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.398000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.398000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.398000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.398000 audit: BPF prog-id=140 op=LOAD Dec 13 02:22:29.398000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff871cf060 a2=74 a3=540051 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.399000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:22:29.399000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.399000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.399000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.399000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.399000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.399000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.399000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.399000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.399000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.399000 audit: BPF prog-id=141 op=LOAD Dec 13 02:22:29.399000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff871cf090 a2=94 a3=2 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.399000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.399000 audit: BPF prog-id=141 op=UNLOAD Dec 13 02:22:29.562000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.562000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.562000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.562000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.562000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.562000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.562000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.562000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.562000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.562000 audit: BPF prog-id=142 op=LOAD Dec 13 02:22:29.562000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff871cef50 a2=40 a3=1 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.562000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.563000 audit: BPF prog-id=142 op=UNLOAD Dec 13 02:22:29.563000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.563000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff871cf020 a2=50 a3=7fff871cf100 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.563000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.578000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.578000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff871cef60 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.578000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff871cef90 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff871ceea0 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff871cefb0 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff871cef90 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff871cef80 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff871cefb0 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff871cef90 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff871cefb0 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff871cef80 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff871ceff0 a2=28 a3=0 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff871ceda0 a2=50 a3=1 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit: BPF prog-id=143 op=LOAD Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff871ceda0 a2=94 a3=5 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff871cee50 a2=50 a3=1 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff871cef70 a2=4 a3=38 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.585000 audit[4084]: AVC avc: denied { confidentiality } for pid=4084 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:29.585000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff871cefc0 a2=94 a3=6 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { confidentiality } for pid=4084 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:29.588000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff871ce770 a2=94 a3=83 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.588000 audit[4084]: AVC avc: denied { confidentiality } for pid=4084 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:29.588000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff871ce770 a2=94 a3=83 items=0 ppid=3973 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.588000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit: BPF prog-id=144 op=LOAD Dec 13 02:22:29.607000 audit[4099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe16868850 a2=98 a3=1999999999999999 items=0 ppid=3973 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.607000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:22:29.607000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit: BPF prog-id=145 op=LOAD Dec 13 02:22:29.607000 audit[4099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe16868730 a2=74 a3=ffff items=0 ppid=3973 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.607000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:22:29.607000 audit: BPF prog-id=145 op=UNLOAD Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.607000 audit: BPF prog-id=146 op=LOAD Dec 13 02:22:29.607000 audit[4099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe16868770 a2=40 a3=7ffe16868950 items=0 ppid=3973 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.607000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:22:29.607000 audit: BPF prog-id=146 op=UNLOAD Dec 13 02:22:29.701871 (udev-worker)[3909]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:22:29.726316 systemd-networkd[1470]: vxlan.calico: Link UP Dec 13 02:22:29.726326 systemd-networkd[1470]: vxlan.calico: Gained carrier Dec 13 02:22:29.837659 (udev-worker)[3907]: Network interface NamePolicy= disabled on kernel command line. Dec 13 02:22:29.837000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.837000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.837000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.837000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.837000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.837000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.837000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.837000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.837000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.837000 audit: BPF prog-id=147 op=LOAD Dec 13 02:22:29.837000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd692e760 a2=98 a3=ffffffff items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.837000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.837000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:22:29.838000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.838000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.838000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.838000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.838000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.838000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.838000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.838000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.838000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.838000 audit: BPF prog-id=148 op=LOAD Dec 13 02:22:29.838000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd692e570 a2=74 a3=540051 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.838000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit: BPF prog-id=149 op=LOAD Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd692e5a0 a2=94 a3=2 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit: BPF prog-id=149 op=UNLOAD Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd692e470 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd692e4a0 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd692e3b0 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd692e4c0 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd692e4a0 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd692e490 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd692e4c0 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd692e4a0 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd692e4c0 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd692e490 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd692e500 a2=28 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.839000 audit: BPF prog-id=150 op=LOAD Dec 13 02:22:29.839000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd692e370 a2=40 a3=0 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.839000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.839000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:22:29.840000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.840000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcd692e360 a2=50 a3=2800 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.840000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcd692e360 a2=50 a3=2800 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.841000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit: BPF prog-id=151 op=LOAD Dec 13 02:22:29.841000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd692db80 a2=94 a3=2 items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.841000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.841000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { perfmon } for pid=4127 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit[4127]: AVC avc: denied { bpf } for pid=4127 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.841000 audit: BPF prog-id=152 op=LOAD Dec 13 02:22:29.841000 audit[4127]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd692dc80 a2=94 a3=2d items=0 ppid=3973 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.841000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:22:29.846000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.846000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.846000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.846000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.846000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.846000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.846000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.846000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.846000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.846000 audit: BPF prog-id=153 op=LOAD Dec 13 02:22:29.846000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6b36ffc0 a2=98 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.846000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:29.846000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit: BPF prog-id=154 op=LOAD Dec 13 02:22:29.847000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6b36fda0 a2=74 a3=540051 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.847000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:29.847000 audit: BPF prog-id=154 op=UNLOAD Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:29.847000 audit: BPF prog-id=155 op=LOAD Dec 13 02:22:29.847000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6b36fdd0 a2=94 a3=2 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:29.847000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:29.847000 audit: BPF prog-id=155 op=UNLOAD Dec 13 02:22:30.001000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.001000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.001000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.001000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.001000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.001000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.001000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.001000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.001000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.001000 audit: BPF prog-id=156 op=LOAD Dec 13 02:22:30.001000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6b36fc90 a2=40 a3=1 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.001000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.002000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:22:30.002000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.002000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff6b36fd60 a2=50 a3=7fff6b36fe40 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.002000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6b36fca0 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6b36fcd0 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6b36fbe0 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6b36fcf0 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6b36fcd0 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6b36fcc0 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6b36fcf0 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6b36fcd0 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6b36fcf0 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6b36fcc0 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.020000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.020000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6b36fd30 a2=28 a3=0 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.020000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6b36fae0 a2=50 a3=1 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit: BPF prog-id=157 op=LOAD Dec 13 02:22:30.021000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6b36fae0 a2=94 a3=5 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.021000 audit: BPF prog-id=157 op=UNLOAD Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6b36fb90 a2=50 a3=1 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff6b36fcb0 a2=4 a3=38 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { confidentiality } for pid=4130 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:30.021000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6b36fd00 a2=94 a3=6 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { confidentiality } for pid=4130 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:30.021000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6b36f4b0 a2=94 a3=83 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { perfmon } for pid=4130 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.021000 audit[4130]: AVC avc: denied { confidentiality } for pid=4130 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:22:30.021000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6b36f4b0 a2=94 a3=83 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.021000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.022000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.022000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6b370ef0 a2=10 a3=f1f00800 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.022000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.023000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.023000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6b370d90 a2=10 a3=3 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.023000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.023000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.023000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6b370d30 a2=10 a3=3 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.023000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.023000 audit[4130]: AVC avc: denied { bpf } for pid=4130 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:30.023000 audit[4130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6b370d30 a2=10 a3=7 items=0 ppid=3973 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.023000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:22:30.032000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:22:30.056713 env[1740]: time="2024-12-13T02:22:30.056660963Z" level=info msg="StopPodSandbox for \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\"" Dec 13 02:22:30.178000 audit[4174]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=4174 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:30.178000 audit[4174]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdaf75b090 a2=0 a3=7ffdaf75b07c items=0 ppid=3973 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.178000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:30.182000 audit[4176]: NETFILTER_CFG table=mangle:98 family=2 entries=16 op=nft_register_chain pid=4176 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:30.182000 audit[4176]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe21f3e170 a2=0 a3=7ffe21f3e15c items=0 ppid=3973 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.182000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:30.191000 audit[4177]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=4177 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:30.191000 audit[4177]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff3b84e6e0 a2=0 a3=7fff3b84e6cc items=0 ppid=3973 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.191000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:30.197000 audit[4173]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4173 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:30.197000 audit[4173]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd5e874270 a2=0 a3=7ffd5e87425c items=0 ppid=3973 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:30.197000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.239 [INFO][4157] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.242 [INFO][4157] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" iface="eth0" netns="/var/run/netns/cni-74a46dd3-5bb6-2d58-26ff-366266ed6d60" Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.243 [INFO][4157] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" iface="eth0" netns="/var/run/netns/cni-74a46dd3-5bb6-2d58-26ff-366266ed6d60" Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.246 [INFO][4157] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" iface="eth0" netns="/var/run/netns/cni-74a46dd3-5bb6-2d58-26ff-366266ed6d60" Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.246 [INFO][4157] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.247 [INFO][4157] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.589 [INFO][4184] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" HandleID="k8s-pod-network.c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.593 [INFO][4184] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.593 [INFO][4184] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.622 [WARNING][4184] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" HandleID="k8s-pod-network.c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.623 [INFO][4184] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" HandleID="k8s-pod-network.c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.625 [INFO][4184] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:30.631528 env[1740]: 2024-12-13 02:22:30.628 [INFO][4157] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:30.637188 env[1740]: time="2024-12-13T02:22:30.637095302Z" level=info msg="TearDown network for sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\" successfully" Dec 13 02:22:30.637538 env[1740]: time="2024-12-13T02:22:30.637504880Z" level=info msg="StopPodSandbox for \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\" returns successfully" Dec 13 02:22:30.642040 systemd[1]: run-netns-cni\x2d74a46dd3\x2d5bb6\x2d2d58\x2d26ff\x2d366266ed6d60.mount: Deactivated successfully. Dec 13 02:22:30.646454 env[1740]: time="2024-12-13T02:22:30.646405482Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k56lm,Uid:b7822b25-c667-4562-ab76-c70c9147bb14,Namespace:calico-system,Attempt:1,}" Dec 13 02:22:30.910188 systemd-networkd[1470]: cali81e90d35e5a: Link UP Dec 13 02:22:30.918726 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:22:30.919006 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali81e90d35e5a: link becomes ready Dec 13 02:22:30.920415 systemd-networkd[1470]: cali81e90d35e5a: Gained carrier Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.740 [INFO][4190] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0 csi-node-driver- calico-system b7822b25-c667-4562-ab76-c70c9147bb14 762 0 2024-12-13 02:22:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-18-8 csi-node-driver-k56lm eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali81e90d35e5a [] []}} ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Namespace="calico-system" Pod="csi-node-driver-k56lm" WorkloadEndpoint="ip--172--31--18--8-k8s-csi--node--driver--k56lm-" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.740 [INFO][4190] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Namespace="calico-system" Pod="csi-node-driver-k56lm" WorkloadEndpoint="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.797 [INFO][4202] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" HandleID="k8s-pod-network.514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.820 [INFO][4202] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" HandleID="k8s-pod-network.514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042bd40), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-18-8", "pod":"csi-node-driver-k56lm", "timestamp":"2024-12-13 02:22:30.797491074 +0000 UTC"}, Hostname:"ip-172-31-18-8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.820 [INFO][4202] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.820 [INFO][4202] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.820 [INFO][4202] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-8' Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.823 [INFO][4202] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" host="ip-172-31-18-8" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.842 [INFO][4202] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-8" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.857 [INFO][4202] ipam/ipam.go 489: Trying affinity for 192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.861 [INFO][4202] ipam/ipam.go 155: Attempting to load block cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.866 [INFO][4202] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.866 [INFO][4202] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.0/26 handle="k8s-pod-network.514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" host="ip-172-31-18-8" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.869 [INFO][4202] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.878 [INFO][4202] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.43.0/26 handle="k8s-pod-network.514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" host="ip-172-31-18-8" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.889 [INFO][4202] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.43.1/26] block=192.168.43.0/26 handle="k8s-pod-network.514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" host="ip-172-31-18-8" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.889 [INFO][4202] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.1/26] handle="k8s-pod-network.514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" host="ip-172-31-18-8" Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.889 [INFO][4202] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:30.962595 env[1740]: 2024-12-13 02:22:30.889 [INFO][4202] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.1/26] IPv6=[] ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" HandleID="k8s-pod-network.514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:30.964926 env[1740]: 2024-12-13 02:22:30.896 [INFO][4190] cni-plugin/k8s.go 386: Populated endpoint ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Namespace="calico-system" Pod="csi-node-driver-k56lm" WorkloadEndpoint="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7822b25-c667-4562-ab76-c70c9147bb14", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"", Pod:"csi-node-driver-k56lm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali81e90d35e5a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:30.964926 env[1740]: 2024-12-13 02:22:30.896 [INFO][4190] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.43.1/32] ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Namespace="calico-system" Pod="csi-node-driver-k56lm" WorkloadEndpoint="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:30.964926 env[1740]: 2024-12-13 02:22:30.896 [INFO][4190] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali81e90d35e5a ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Namespace="calico-system" Pod="csi-node-driver-k56lm" WorkloadEndpoint="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:30.964926 env[1740]: 2024-12-13 02:22:30.922 [INFO][4190] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Namespace="calico-system" Pod="csi-node-driver-k56lm" WorkloadEndpoint="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:30.964926 env[1740]: 2024-12-13 02:22:30.923 [INFO][4190] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Namespace="calico-system" Pod="csi-node-driver-k56lm" WorkloadEndpoint="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7822b25-c667-4562-ab76-c70c9147bb14", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae", Pod:"csi-node-driver-k56lm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali81e90d35e5a", MAC:"6a:79:2e:b5:95:6c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:30.964926 env[1740]: 2024-12-13 02:22:30.957 [INFO][4190] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae" Namespace="calico-system" Pod="csi-node-driver-k56lm" WorkloadEndpoint="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:30.989423 env[1740]: time="2024-12-13T02:22:30.989312787Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:22:30.989747 env[1740]: time="2024-12-13T02:22:30.989705543Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:22:30.989903 env[1740]: time="2024-12-13T02:22:30.989876730Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:22:30.990511 env[1740]: time="2024-12-13T02:22:30.990363580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae pid=4233 runtime=io.containerd.runc.v2 Dec 13 02:22:31.037533 systemd[1]: Started cri-containerd-514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae.scope. Dec 13 02:22:31.038000 audit[4253]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4253 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:31.038000 audit[4253]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd7f90bfc0 a2=0 a3=7ffd7f90bfac items=0 ppid=3973 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.038000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:31.064530 env[1740]: time="2024-12-13T02:22:31.064483306Z" level=info msg="StopPodSandbox for \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\"" Dec 13 02:22:31.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.082000 audit: BPF prog-id=158 op=LOAD Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4233 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346638383135666263363530653961333631636635646539336432 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4233 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346638383135666263363530653961333631636635646539336432 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit: BPF prog-id=159 op=LOAD Dec 13 02:22:31.084000 audit[4245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ba2d0 items=0 ppid=4233 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346638383135666263363530653961333631636635646539336432 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit: BPF prog-id=160 op=LOAD Dec 13 02:22:31.084000 audit[4245]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ba318 items=0 ppid=4233 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346638383135666263363530653961333631636635646539336432 Dec 13 02:22:31.084000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:22:31.084000 audit: BPF prog-id=159 op=UNLOAD Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { perfmon } for pid=4245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit[4245]: AVC avc: denied { bpf } for pid=4245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.084000 audit: BPF prog-id=161 op=LOAD Dec 13 02:22:31.084000 audit[4245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ba728 items=0 ppid=4233 pid=4245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531346638383135666263363530653961333631636635646539336432 Dec 13 02:22:31.140623 env[1740]: time="2024-12-13T02:22:31.140553305Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-k56lm,Uid:b7822b25-c667-4562-ab76-c70c9147bb14,Namespace:calico-system,Attempt:1,} returns sandbox id \"514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae\"" Dec 13 02:22:31.149943 env[1740]: time="2024-12-13T02:22:31.149887405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:22:31.240563 systemd-networkd[1470]: vxlan.calico: Gained IPv6LL Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.181 [INFO][4275] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.181 [INFO][4275] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" iface="eth0" netns="/var/run/netns/cni-89bb44e7-f07c-b637-524b-4fa5f08dd11a" Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.182 [INFO][4275] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" iface="eth0" netns="/var/run/netns/cni-89bb44e7-f07c-b637-524b-4fa5f08dd11a" Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.182 [INFO][4275] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" iface="eth0" netns="/var/run/netns/cni-89bb44e7-f07c-b637-524b-4fa5f08dd11a" Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.182 [INFO][4275] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.182 [INFO][4275] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.234 [INFO][4288] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" HandleID="k8s-pod-network.d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.234 [INFO][4288] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.234 [INFO][4288] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.250 [WARNING][4288] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" HandleID="k8s-pod-network.d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.250 [INFO][4288] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" HandleID="k8s-pod-network.d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.258 [INFO][4288] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:31.267940 env[1740]: 2024-12-13 02:22:31.264 [INFO][4275] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:31.267940 env[1740]: time="2024-12-13T02:22:31.267759957Z" level=info msg="TearDown network for sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\" successfully" Dec 13 02:22:31.267940 env[1740]: time="2024-12-13T02:22:31.267808121Z" level=info msg="StopPodSandbox for \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\" returns successfully" Dec 13 02:22:31.269760 env[1740]: time="2024-12-13T02:22:31.268891324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5nh99,Uid:d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff,Namespace:kube-system,Attempt:1,}" Dec 13 02:22:31.470905 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid48cb2d0f1d: link becomes ready Dec 13 02:22:31.470559 systemd-networkd[1470]: calid48cb2d0f1d: Link UP Dec 13 02:22:31.470783 systemd-networkd[1470]: calid48cb2d0f1d: Gained carrier Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.340 [INFO][4295] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0 coredns-7db6d8ff4d- kube-system d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff 770 0 2024-12-13 02:21:53 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-18-8 coredns-7db6d8ff4d-5nh99 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid48cb2d0f1d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5nh99" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.340 [INFO][4295] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5nh99" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.384 [INFO][4306] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" HandleID="k8s-pod-network.8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.398 [INFO][4306] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" HandleID="k8s-pod-network.8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ce420), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-18-8", "pod":"coredns-7db6d8ff4d-5nh99", "timestamp":"2024-12-13 02:22:31.384047353 +0000 UTC"}, Hostname:"ip-172-31-18-8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.399 [INFO][4306] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.399 [INFO][4306] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.399 [INFO][4306] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-8' Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.402 [INFO][4306] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" host="ip-172-31-18-8" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.410 [INFO][4306] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-8" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.420 [INFO][4306] ipam/ipam.go 489: Trying affinity for 192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.424 [INFO][4306] ipam/ipam.go 155: Attempting to load block cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.432 [INFO][4306] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.432 [INFO][4306] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.0/26 handle="k8s-pod-network.8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" host="ip-172-31-18-8" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.444 [INFO][4306] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4 Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.452 [INFO][4306] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.43.0/26 handle="k8s-pod-network.8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" host="ip-172-31-18-8" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.461 [INFO][4306] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.43.2/26] block=192.168.43.0/26 handle="k8s-pod-network.8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" host="ip-172-31-18-8" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.461 [INFO][4306] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.2/26] handle="k8s-pod-network.8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" host="ip-172-31-18-8" Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.461 [INFO][4306] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:31.492040 env[1740]: 2024-12-13 02:22:31.461 [INFO][4306] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.2/26] IPv6=[] ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" HandleID="k8s-pod-network.8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:31.493735 env[1740]: 2024-12-13 02:22:31.464 [INFO][4295] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5nh99" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 21, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"", Pod:"coredns-7db6d8ff4d-5nh99", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid48cb2d0f1d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:31.493735 env[1740]: 2024-12-13 02:22:31.465 [INFO][4295] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.43.2/32] ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5nh99" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:31.493735 env[1740]: 2024-12-13 02:22:31.465 [INFO][4295] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid48cb2d0f1d ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5nh99" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:31.493735 env[1740]: 2024-12-13 02:22:31.468 [INFO][4295] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5nh99" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:31.493735 env[1740]: 2024-12-13 02:22:31.473 [INFO][4295] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5nh99" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 21, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4", Pod:"coredns-7db6d8ff4d-5nh99", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid48cb2d0f1d", MAC:"0a:bf:eb:7d:9f:a4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:31.493735 env[1740]: 2024-12-13 02:22:31.487 [INFO][4295] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4" Namespace="kube-system" Pod="coredns-7db6d8ff4d-5nh99" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:31.515590 env[1740]: time="2024-12-13T02:22:31.515497398Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:22:31.515889 env[1740]: time="2024-12-13T02:22:31.515823702Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:22:31.516025 env[1740]: time="2024-12-13T02:22:31.516000393Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:22:31.516367 env[1740]: time="2024-12-13T02:22:31.516335511Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4 pid=4330 runtime=io.containerd.runc.v2 Dec 13 02:22:31.525000 audit[4340]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4340 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:31.525000 audit[4340]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe91d86de0 a2=0 a3=7ffe91d86dcc items=0 ppid=3973 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.525000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:31.537756 systemd[1]: Started cri-containerd-8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4.scope. Dec 13 02:22:31.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.565000 audit: BPF prog-id=162 op=LOAD Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4330 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383834393264613738613136303638623231376131363831343566 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4330 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383834393264613738613136303638623231376131363831343566 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit: BPF prog-id=163 op=LOAD Dec 13 02:22:31.566000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022c350 items=0 ppid=4330 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383834393264613738613136303638623231376131363831343566 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit: BPF prog-id=164 op=LOAD Dec 13 02:22:31.566000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022c398 items=0 ppid=4330 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383834393264613738613136303638623231376131363831343566 Dec 13 02:22:31.566000 audit: BPF prog-id=164 op=UNLOAD Dec 13 02:22:31.566000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { perfmon } for pid=4339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.566000 audit: BPF prog-id=165 op=LOAD Dec 13 02:22:31.566000 audit[4339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00022c7a8 items=0 ppid=4330 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837383834393264613738613136303638623231376131363831343566 Dec 13 02:22:31.610952 env[1740]: time="2024-12-13T02:22:31.610898573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-5nh99,Uid:d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff,Namespace:kube-system,Attempt:1,} returns sandbox id \"8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4\"" Dec 13 02:22:31.619240 env[1740]: time="2024-12-13T02:22:31.619192188Z" level=info msg="CreateContainer within sandbox \"8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:22:31.649488 systemd[1]: run-netns-cni\x2d89bb44e7\x2df07c\x2db637\x2d524b\x2d4fa5f08dd11a.mount: Deactivated successfully. Dec 13 02:22:31.662518 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3899912818.mount: Deactivated successfully. Dec 13 02:22:31.670265 env[1740]: time="2024-12-13T02:22:31.670219764Z" level=info msg="CreateContainer within sandbox \"8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c00d49c7fc75eac97045f9582bf8eb3b8b66f6c932c14214063b73ef87c20308\"" Dec 13 02:22:31.672007 env[1740]: time="2024-12-13T02:22:31.671269505Z" level=info msg="StartContainer for \"c00d49c7fc75eac97045f9582bf8eb3b8b66f6c932c14214063b73ef87c20308\"" Dec 13 02:22:31.707771 systemd[1]: Started cri-containerd-c00d49c7fc75eac97045f9582bf8eb3b8b66f6c932c14214063b73ef87c20308.scope. Dec 13 02:22:31.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.735000 audit: BPF prog-id=166 op=LOAD Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4330 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306434396337666337356561633937303435663935383262663865 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4330 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306434396337666337356561633937303435663935383262663865 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.736000 audit: BPF prog-id=167 op=LOAD Dec 13 02:22:31.736000 audit[4372]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a0870 items=0 ppid=4330 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306434396337666337356561633937303435663935383262663865 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit: BPF prog-id=168 op=LOAD Dec 13 02:22:31.737000 audit[4372]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a08b8 items=0 ppid=4330 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306434396337666337356561633937303435663935383262663865 Dec 13 02:22:31.737000 audit: BPF prog-id=168 op=UNLOAD Dec 13 02:22:31.737000 audit: BPF prog-id=167 op=UNLOAD Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { perfmon } for pid=4372 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit[4372]: AVC avc: denied { bpf } for pid=4372 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:31.737000 audit: BPF prog-id=169 op=LOAD Dec 13 02:22:31.737000 audit[4372]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0cc8 items=0 ppid=4330 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:31.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306434396337666337356561633937303435663935383262663865 Dec 13 02:22:31.771066 env[1740]: time="2024-12-13T02:22:31.771018966Z" level=info msg="StartContainer for \"c00d49c7fc75eac97045f9582bf8eb3b8b66f6c932c14214063b73ef87c20308\" returns successfully" Dec 13 02:22:32.065001 env[1740]: time="2024-12-13T02:22:32.064871535Z" level=info msg="StopPodSandbox for \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\"" Dec 13 02:22:32.078778 env[1740]: time="2024-12-13T02:22:32.066052731Z" level=info msg="StopPodSandbox for \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\"" Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.283 [INFO][4430] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.284 [INFO][4430] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" iface="eth0" netns="/var/run/netns/cni-042d3f1f-9638-90f8-2db4-96b790d026e9" Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.284 [INFO][4430] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" iface="eth0" netns="/var/run/netns/cni-042d3f1f-9638-90f8-2db4-96b790d026e9" Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.284 [INFO][4430] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" iface="eth0" netns="/var/run/netns/cni-042d3f1f-9638-90f8-2db4-96b790d026e9" Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.284 [INFO][4430] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.284 [INFO][4430] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.394 [INFO][4442] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" HandleID="k8s-pod-network.a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.400 [INFO][4442] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.400 [INFO][4442] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.463 [WARNING][4442] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" HandleID="k8s-pod-network.a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.463 [INFO][4442] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" HandleID="k8s-pod-network.a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.470 [INFO][4442] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:32.502549 env[1740]: 2024-12-13 02:22:32.498 [INFO][4430] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:32.514601 env[1740]: time="2024-12-13T02:22:32.514535533Z" level=info msg="TearDown network for sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\" successfully" Dec 13 02:22:32.514601 env[1740]: time="2024-12-13T02:22:32.514598406Z" level=info msg="StopPodSandbox for \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\" returns successfully" Dec 13 02:22:32.523914 env[1740]: time="2024-12-13T02:22:32.523780364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96ff6ddd-bnmxs,Uid:217fa5a0-a100-45e7-acaa-349611b79451,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.328 [INFO][4429] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.328 [INFO][4429] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" iface="eth0" netns="/var/run/netns/cni-a6a11728-ad68-dc8a-634e-e55c464472aa" Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.328 [INFO][4429] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" iface="eth0" netns="/var/run/netns/cni-a6a11728-ad68-dc8a-634e-e55c464472aa" Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.328 [INFO][4429] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" iface="eth0" netns="/var/run/netns/cni-a6a11728-ad68-dc8a-634e-e55c464472aa" Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.328 [INFO][4429] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.328 [INFO][4429] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.429 [INFO][4450] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" HandleID="k8s-pod-network.787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.429 [INFO][4450] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.514 [INFO][4450] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.552 [WARNING][4450] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" HandleID="k8s-pod-network.787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.552 [INFO][4450] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" HandleID="k8s-pod-network.787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.555 [INFO][4450] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:32.561755 env[1740]: 2024-12-13 02:22:32.557 [INFO][4429] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:32.562497 env[1740]: time="2024-12-13T02:22:32.561929821Z" level=info msg="TearDown network for sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\" successfully" Dec 13 02:22:32.562497 env[1740]: time="2024-12-13T02:22:32.561968268Z" level=info msg="StopPodSandbox for \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\" returns successfully" Dec 13 02:22:32.562786 env[1740]: time="2024-12-13T02:22:32.562753679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbfb5f45c-8kkfd,Uid:402a696b-090d-4af6-a484-ec67cf641104,Namespace:calico-system,Attempt:1,}" Dec 13 02:22:32.650302 kernel: kauditd_printk_skb: 725 callbacks suppressed Dec 13 02:22:32.650453 kernel: audit: type=1325 audit(1734056552.629:1156): table=filter:103 family=2 entries=16 op=nft_register_rule pid=4475 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:32.629000 audit[4475]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4475 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:32.644617 systemd[1]: run-containerd-runc-k8s.io-c00d49c7fc75eac97045f9582bf8eb3b8b66f6c932c14214063b73ef87c20308-runc.9yifBJ.mount: Deactivated successfully. Dec 13 02:22:32.644759 systemd[1]: run-netns-cni\x2d042d3f1f\x2d9638\x2d90f8\x2d2db4\x2d96b790d026e9.mount: Deactivated successfully. Dec 13 02:22:32.644890 systemd[1]: run-netns-cni\x2da6a11728\x2dad68\x2ddc8a\x2d634e\x2de55c464472aa.mount: Deactivated successfully. Dec 13 02:22:32.629000 audit[4475]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc2a0092b0 a2=0 a3=7ffc2a00929c items=0 ppid=2987 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:32.656957 kernel: audit: type=1300 audit(1734056552.629:1156): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc2a0092b0 a2=0 a3=7ffc2a00929c items=0 ppid=2987 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:32.665599 kernel: audit: type=1327 audit(1734056552.629:1156): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:32.665767 kernel: audit: type=1325 audit(1734056552.656:1157): table=nat:104 family=2 entries=14 op=nft_register_rule pid=4475 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:32.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:32.656000 audit[4475]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4475 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:32.656000 audit[4475]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc2a0092b0 a2=0 a3=0 items=0 ppid=2987 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:32.674960 kernel: audit: type=1300 audit(1734056552.656:1157): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc2a0092b0 a2=0 a3=0 items=0 ppid=2987 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:32.679884 kernel: audit: type=1327 audit(1734056552.656:1157): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:32.656000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:32.890335 systemd-networkd[1470]: cali5a3385cf32e: Link UP Dec 13 02:22:32.893910 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:22:32.897254 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5a3385cf32e: link becomes ready Dec 13 02:22:32.895298 systemd-networkd[1470]: cali5a3385cf32e: Gained carrier Dec 13 02:22:32.926164 kubelet[2815]: I1213 02:22:32.925129 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-5nh99" podStartSLOduration=39.925102806 podStartE2EDuration="39.925102806s" podCreationTimestamp="2024-12-13 02:21:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:22:32.456293387 +0000 UTC m=+50.758821813" watchObservedRunningTime="2024-12-13 02:22:32.925102806 +0000 UTC m=+51.227631233" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.704 [INFO][4459] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0 calico-apiserver-7f96ff6ddd- calico-apiserver 217fa5a0-a100-45e7-acaa-349611b79451 780 0 2024-12-13 02:22:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7f96ff6ddd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-18-8 calico-apiserver-7f96ff6ddd-bnmxs eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5a3385cf32e [] []}} ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-bnmxs" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.704 [INFO][4459] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-bnmxs" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.809 [INFO][4485] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" HandleID="k8s-pod-network.25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.832 [INFO][4485] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" HandleID="k8s-pod-network.25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004025e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-18-8", "pod":"calico-apiserver-7f96ff6ddd-bnmxs", "timestamp":"2024-12-13 02:22:32.809571585 +0000 UTC"}, Hostname:"ip-172-31-18-8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.832 [INFO][4485] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.833 [INFO][4485] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.833 [INFO][4485] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-8' Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.835 [INFO][4485] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" host="ip-172-31-18-8" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.842 [INFO][4485] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-8" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.849 [INFO][4485] ipam/ipam.go 489: Trying affinity for 192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.857 [INFO][4485] ipam/ipam.go 155: Attempting to load block cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.861 [INFO][4485] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.861 [INFO][4485] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.0/26 handle="k8s-pod-network.25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" host="ip-172-31-18-8" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.863 [INFO][4485] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.870 [INFO][4485] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.43.0/26 handle="k8s-pod-network.25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" host="ip-172-31-18-8" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.881 [INFO][4485] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.43.3/26] block=192.168.43.0/26 handle="k8s-pod-network.25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" host="ip-172-31-18-8" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.881 [INFO][4485] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.3/26] handle="k8s-pod-network.25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" host="ip-172-31-18-8" Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.881 [INFO][4485] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:32.933355 env[1740]: 2024-12-13 02:22:32.881 [INFO][4485] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.3/26] IPv6=[] ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" HandleID="k8s-pod-network.25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:32.934366 env[1740]: 2024-12-13 02:22:32.884 [INFO][4459] cni-plugin/k8s.go 386: Populated endpoint ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-bnmxs" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0", GenerateName:"calico-apiserver-7f96ff6ddd-", Namespace:"calico-apiserver", SelfLink:"", UID:"217fa5a0-a100-45e7-acaa-349611b79451", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96ff6ddd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"", Pod:"calico-apiserver-7f96ff6ddd-bnmxs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5a3385cf32e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:32.934366 env[1740]: 2024-12-13 02:22:32.884 [INFO][4459] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.43.3/32] ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-bnmxs" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:32.934366 env[1740]: 2024-12-13 02:22:32.884 [INFO][4459] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5a3385cf32e ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-bnmxs" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:32.934366 env[1740]: 2024-12-13 02:22:32.898 [INFO][4459] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-bnmxs" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:32.934366 env[1740]: 2024-12-13 02:22:32.899 [INFO][4459] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-bnmxs" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0", GenerateName:"calico-apiserver-7f96ff6ddd-", Namespace:"calico-apiserver", SelfLink:"", UID:"217fa5a0-a100-45e7-acaa-349611b79451", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96ff6ddd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd", Pod:"calico-apiserver-7f96ff6ddd-bnmxs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5a3385cf32e", MAC:"b6:a3:e5:66:a1:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:32.934366 env[1740]: 2024-12-13 02:22:32.928 [INFO][4459] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-bnmxs" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:32.988020 systemd-networkd[1470]: calid48cb2d0f1d: Gained IPv6LL Dec 13 02:22:32.988395 systemd-networkd[1470]: cali81e90d35e5a: Gained IPv6LL Dec 13 02:22:33.070397 env[1740]: time="2024-12-13T02:22:33.070350504Z" level=info msg="StopPodSandbox for \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\"" Dec 13 02:22:33.112873 kernel: audit: type=1325 audit(1734056553.093:1158): table=filter:105 family=2 entries=48 op=nft_register_chain pid=4516 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:33.113039 kernel: audit: type=1300 audit(1734056553.093:1158): arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7ffeaf538380 a2=0 a3=7ffeaf53836c items=0 ppid=3973 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.117793 kernel: audit: type=1327 audit(1734056553.093:1158): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:33.093000 audit[4516]: NETFILTER_CFG table=filter:105 family=2 entries=48 op=nft_register_chain pid=4516 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:33.093000 audit[4516]: SYSCALL arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7ffeaf538380 a2=0 a3=7ffeaf53836c items=0 ppid=3973 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.093000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:33.152692 env[1740]: time="2024-12-13T02:22:33.151948085Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:22:33.152692 env[1740]: time="2024-12-13T02:22:33.152032423Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:22:33.152692 env[1740]: time="2024-12-13T02:22:33.152049530Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:22:33.152692 env[1740]: time="2024-12-13T02:22:33.152295713Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd pid=4523 runtime=io.containerd.runc.v2 Dec 13 02:22:33.254406 systemd-networkd[1470]: cali19ec73a8ec0: Link UP Dec 13 02:22:33.257240 systemd-networkd[1470]: cali19ec73a8ec0: Gained carrier Dec 13 02:22:33.257849 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali19ec73a8ec0: link becomes ready Dec 13 02:22:33.297023 systemd[1]: Started cri-containerd-25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd.scope. Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:32.736 [INFO][4469] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0 calico-kube-controllers-dbfb5f45c- calico-system 402a696b-090d-4af6-a484-ec67cf641104 781 0 2024-12-13 02:22:04 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:dbfb5f45c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-18-8 calico-kube-controllers-dbfb5f45c-8kkfd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali19ec73a8ec0 [] []}} ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Namespace="calico-system" Pod="calico-kube-controllers-dbfb5f45c-8kkfd" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:32.736 [INFO][4469] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Namespace="calico-system" Pod="calico-kube-controllers-dbfb5f45c-8kkfd" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:32.874 [INFO][4489] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" HandleID="k8s-pod-network.f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:32.912 [INFO][4489] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" HandleID="k8s-pod-network.f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308d30), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-18-8", "pod":"calico-kube-controllers-dbfb5f45c-8kkfd", "timestamp":"2024-12-13 02:22:32.874954177 +0000 UTC"}, Hostname:"ip-172-31-18-8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:32.912 [INFO][4489] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:32.912 [INFO][4489] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:32.912 [INFO][4489] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-8' Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:32.916 [INFO][4489] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" host="ip-172-31-18-8" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:32.937 [INFO][4489] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-8" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:32.958 [INFO][4489] ipam/ipam.go 489: Trying affinity for 192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:33.063 [INFO][4489] ipam/ipam.go 155: Attempting to load block cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:33.076 [INFO][4489] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:33.077 [INFO][4489] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.0/26 handle="k8s-pod-network.f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" host="ip-172-31-18-8" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:33.101 [INFO][4489] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:33.117 [INFO][4489] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.43.0/26 handle="k8s-pod-network.f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" host="ip-172-31-18-8" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:33.193 [INFO][4489] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.43.4/26] block=192.168.43.0/26 handle="k8s-pod-network.f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" host="ip-172-31-18-8" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:33.193 [INFO][4489] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.4/26] handle="k8s-pod-network.f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" host="ip-172-31-18-8" Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:33.193 [INFO][4489] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:33.318223 env[1740]: 2024-12-13 02:22:33.193 [INFO][4489] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.4/26] IPv6=[] ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" HandleID="k8s-pod-network.f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:33.319395 env[1740]: 2024-12-13 02:22:33.214 [INFO][4469] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Namespace="calico-system" Pod="calico-kube-controllers-dbfb5f45c-8kkfd" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0", GenerateName:"calico-kube-controllers-dbfb5f45c-", Namespace:"calico-system", SelfLink:"", UID:"402a696b-090d-4af6-a484-ec67cf641104", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbfb5f45c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"", Pod:"calico-kube-controllers-dbfb5f45c-8kkfd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali19ec73a8ec0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:33.319395 env[1740]: 2024-12-13 02:22:33.220 [INFO][4469] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.43.4/32] ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Namespace="calico-system" Pod="calico-kube-controllers-dbfb5f45c-8kkfd" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:33.319395 env[1740]: 2024-12-13 02:22:33.220 [INFO][4469] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali19ec73a8ec0 ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Namespace="calico-system" Pod="calico-kube-controllers-dbfb5f45c-8kkfd" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:33.319395 env[1740]: 2024-12-13 02:22:33.258 [INFO][4469] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Namespace="calico-system" Pod="calico-kube-controllers-dbfb5f45c-8kkfd" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:33.319395 env[1740]: 2024-12-13 02:22:33.258 [INFO][4469] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Namespace="calico-system" Pod="calico-kube-controllers-dbfb5f45c-8kkfd" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0", GenerateName:"calico-kube-controllers-dbfb5f45c-", Namespace:"calico-system", SelfLink:"", UID:"402a696b-090d-4af6-a484-ec67cf641104", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbfb5f45c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa", Pod:"calico-kube-controllers-dbfb5f45c-8kkfd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali19ec73a8ec0", MAC:"76:44:3a:f4:a3:1d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:33.319395 env[1740]: 2024-12-13 02:22:33.310 [INFO][4469] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa" Namespace="calico-system" Pod="calico-kube-controllers-dbfb5f45c-8kkfd" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:33.394589 env[1740]: time="2024-12-13T02:22:33.394502233Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:22:33.394940 env[1740]: time="2024-12-13T02:22:33.394560817Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:22:33.394940 env[1740]: time="2024-12-13T02:22:33.394574307Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:22:33.394940 env[1740]: time="2024-12-13T02:22:33.394896808Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa pid=4574 runtime=io.containerd.runc.v2 Dec 13 02:22:33.471788 systemd[1]: Started cri-containerd-f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa.scope. Dec 13 02:22:33.498933 env[1740]: time="2024-12-13T02:22:33.498880306Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:33.504186 env[1740]: time="2024-12-13T02:22:33.504141634Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:33.508209 env[1740]: time="2024-12-13T02:22:33.508164130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:33.512357 env[1740]: time="2024-12-13T02:22:33.512311434Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:33.513653 env[1740]: time="2024-12-13T02:22:33.513605041Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:22:33.522063 env[1740]: time="2024-12-13T02:22:33.522009442Z" level=info msg="CreateContainer within sandbox \"514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:22:33.554352 env[1740]: time="2024-12-13T02:22:33.554281482Z" level=info msg="CreateContainer within sandbox \"514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0ff892f34385ea0db19c54617657ff57854ed45f2614cf2213ec64d3a61bf05e\"" Dec 13 02:22:33.558742 env[1740]: time="2024-12-13T02:22:33.558694225Z" level=info msg="StartContainer for \"0ff892f34385ea0db19c54617657ff57854ed45f2614cf2213ec64d3a61bf05e\"" Dec 13 02:22:33.601566 systemd[1]: Started cri-containerd-0ff892f34385ea0db19c54617657ff57854ed45f2614cf2213ec64d3a61bf05e.scope. Dec 13 02:22:33.663814 systemd[1]: run-containerd-runc-k8s.io-25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd-runc.bhCXrz.mount: Deactivated successfully. Dec 13 02:22:33.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.697864 kernel: audit: type=1400 audit(1734056553.689:1159): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.690000 audit: BPF prog-id=170 op=LOAD Dec 13 02:22:33.697000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.697000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=4523 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235643938353166313161623833663039653036643832373635373663 Dec 13 02:22:33.698000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.698000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=4523 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235643938353166313161623833663039653036643832373635373663 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit: BPF prog-id=171 op=LOAD Dec 13 02:22:33.701000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001cd1a0 items=0 ppid=4523 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235643938353166313161623833663039653036643832373635373663 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit: BPF prog-id=172 op=LOAD Dec 13 02:22:33.701000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001cd1e8 items=0 ppid=4523 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235643938353166313161623833663039653036643832373635373663 Dec 13 02:22:33.701000 audit: BPF prog-id=172 op=UNLOAD Dec 13 02:22:33.701000 audit: BPF prog-id=171 op=UNLOAD Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { perfmon } for pid=4539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit[4539]: AVC avc: denied { bpf } for pid=4539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.701000 audit: BPF prog-id=173 op=LOAD Dec 13 02:22:33.701000 audit[4539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001cd5f8 items=0 ppid=4523 pid=4539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235643938353166313161623833663039653036643832373635373663 Dec 13 02:22:33.730000 audit[4622]: NETFILTER_CFG table=filter:106 family=2 entries=42 op=nft_register_chain pid=4622 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.714 [INFO][4553] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.714 [INFO][4553] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" iface="eth0" netns="/var/run/netns/cni-1257d348-d451-dc3e-c2ba-2ddb1a8a4e27" Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.714 [INFO][4553] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" iface="eth0" netns="/var/run/netns/cni-1257d348-d451-dc3e-c2ba-2ddb1a8a4e27" Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.714 [INFO][4553] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" iface="eth0" netns="/var/run/netns/cni-1257d348-d451-dc3e-c2ba-2ddb1a8a4e27" Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.714 [INFO][4553] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.714 [INFO][4553] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.794 [INFO][4623] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" HandleID="k8s-pod-network.01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.795 [INFO][4623] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.795 [INFO][4623] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.809 [WARNING][4623] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" HandleID="k8s-pod-network.01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.809 [INFO][4623] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" HandleID="k8s-pod-network.01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.813 [INFO][4623] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:33.820734 env[1740]: 2024-12-13 02:22:33.815 [INFO][4553] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:33.822807 env[1740]: time="2024-12-13T02:22:33.822750608Z" level=info msg="TearDown network for sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\" successfully" Dec 13 02:22:33.823128 env[1740]: time="2024-12-13T02:22:33.823096846Z" level=info msg="StopPodSandbox for \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\" returns successfully" Dec 13 02:22:33.730000 audit[4622]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7ffd5d95bdf0 a2=0 a3=7ffd5d95bddc items=0 ppid=3973 pid=4622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.730000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:33.826130 systemd[1]: run-netns-cni\x2d1257d348\x2dd451\x2ddc3e\x2dc2ba\x2d2ddb1a8a4e27.mount: Deactivated successfully. Dec 13 02:22:33.828418 env[1740]: time="2024-12-13T02:22:33.828376894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-t95v7,Uid:7b2ece73-537c-4b92-90c7-5f2bf4bedeb6,Namespace:kube-system,Attempt:1,}" Dec 13 02:22:33.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.896000 audit: BPF prog-id=174 op=LOAD Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4574 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639333937663063633662396361336663393561383233653363323565 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4574 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639333937663063633662396361336663393561383233653363323565 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit: BPF prog-id=175 op=LOAD Dec 13 02:22:33.897000 audit[4584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000301170 items=0 ppid=4574 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639333937663063633662396361336663393561383233653363323565 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.897000 audit: BPF prog-id=176 op=LOAD Dec 13 02:22:33.897000 audit[4584]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003011b8 items=0 ppid=4574 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639333937663063633662396361336663393561383233653363323565 Dec 13 02:22:33.898000 audit: BPF prog-id=176 op=UNLOAD Dec 13 02:22:33.898000 audit: BPF prog-id=175 op=UNLOAD Dec 13 02:22:33.898000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.898000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.898000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.898000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.898000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.898000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.898000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.898000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.898000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.898000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.898000 audit: BPF prog-id=177 op=LOAD Dec 13 02:22:33.898000 audit[4584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003015c8 items=0 ppid=4574 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639333937663063633662396361336663393561383233653363323565 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fbd56b9ccb8 items=0 ppid=4233 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663839326633343338356561306462313963353436313736353766 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit: BPF prog-id=178 op=LOAD Dec 13 02:22:33.929000 audit[4612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b6a68 items=0 ppid=4233 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663839326633343338356561306462313963353436313736353766 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.929000 audit: BPF prog-id=179 op=LOAD Dec 13 02:22:33.929000 audit[4612]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b6ab8 items=0 ppid=4233 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663839326633343338356561306462313963353436313736353766 Dec 13 02:22:33.929000 audit: BPF prog-id=179 op=UNLOAD Dec 13 02:22:33.930000 audit: BPF prog-id=178 op=UNLOAD Dec 13 02:22:33.930000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.930000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.930000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.930000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.930000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.930000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.930000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.930000 audit[4612]: AVC avc: denied { perfmon } for pid=4612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.930000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.930000 audit[4612]: AVC avc: denied { bpf } for pid=4612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:33.930000 audit: BPF prog-id=180 op=LOAD Dec 13 02:22:33.930000 audit[4612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b6b48 items=0 ppid=4233 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:33.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663839326633343338356561306462313963353436313736353766 Dec 13 02:22:33.999956 systemd[1]: Started sshd@7-172.31.18.8:22-139.178.68.195:33170.service. Dec 13 02:22:33.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.18.8:22-139.178.68.195:33170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:34.058106 env[1740]: time="2024-12-13T02:22:34.056129329Z" level=info msg="StopPodSandbox for \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\"" Dec 13 02:22:34.061000 audit[4657]: NETFILTER_CFG table=filter:107 family=2 entries=13 op=nft_register_rule pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:34.061000 audit[4657]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffff0bc3490 a2=0 a3=7ffff0bc347c items=0 ppid=2987 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:34.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:34.066000 audit[4657]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:34.066000 audit[4657]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffff0bc3490 a2=0 a3=7ffff0bc347c items=0 ppid=2987 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:34.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:34.203381 env[1740]: time="2024-12-13T02:22:34.203312313Z" level=info msg="StartContainer for \"0ff892f34385ea0db19c54617657ff57854ed45f2614cf2213ec64d3a61bf05e\" returns successfully" Dec 13 02:22:34.211275 env[1740]: time="2024-12-13T02:22:34.211221444Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:22:34.264000 audit[4659]: USER_ACCT pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:34.267343 sshd[4659]: Accepted publickey for core from 139.178.68.195 port 33170 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:34.266000 audit[4659]: CRED_ACQ pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:34.266000 audit[4659]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaa9ff470 a2=3 a3=0 items=0 ppid=1 pid=4659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:34.266000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:22:34.272199 sshd[4659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:34.291611 systemd[1]: Started session-8.scope. Dec 13 02:22:34.294440 systemd-logind[1734]: New session 8 of user core. Dec 13 02:22:34.305000 audit[4659]: USER_START pid=4659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:34.308000 audit[4703]: CRED_ACQ pid=4703 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:34.319995 env[1740]: time="2024-12-13T02:22:34.319908974Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96ff6ddd-bnmxs,Uid:217fa5a0-a100-45e7-acaa-349611b79451,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd\"" Dec 13 02:22:34.358633 systemd-networkd[1470]: cali6e5d182c100: Link UP Dec 13 02:22:34.392772 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:22:34.393018 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6e5d182c100: link becomes ready Dec 13 02:22:34.393502 systemd-networkd[1470]: cali6e5d182c100: Gained carrier Dec 13 02:22:34.433234 env[1740]: time="2024-12-13T02:22:34.432356619Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbfb5f45c-8kkfd,Uid:402a696b-090d-4af6-a484-ec67cf641104,Namespace:calico-system,Attempt:1,} returns sandbox id \"f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa\"" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:33.984 [INFO][4643] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0 coredns-7db6d8ff4d- kube-system 7b2ece73-537c-4b92-90c7-5f2bf4bedeb6 803 0 2024-12-13 02:21:53 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-18-8 coredns-7db6d8ff4d-t95v7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6e5d182c100 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t95v7" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:33.988 [INFO][4643] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t95v7" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.176 [INFO][4660] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" HandleID="k8s-pod-network.f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.203 [INFO][4660] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" HandleID="k8s-pod-network.f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f1e80), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-18-8", "pod":"coredns-7db6d8ff4d-t95v7", "timestamp":"2024-12-13 02:22:34.176909674 +0000 UTC"}, Hostname:"ip-172-31-18-8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.203 [INFO][4660] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.203 [INFO][4660] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.203 [INFO][4660] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-8' Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.208 [INFO][4660] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" host="ip-172-31-18-8" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.228 [INFO][4660] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-8" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.252 [INFO][4660] ipam/ipam.go 489: Trying affinity for 192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.257 [INFO][4660] ipam/ipam.go 155: Attempting to load block cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.262 [INFO][4660] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.263 [INFO][4660] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.0/26 handle="k8s-pod-network.f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" host="ip-172-31-18-8" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.278 [INFO][4660] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2 Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.309 [INFO][4660] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.43.0/26 handle="k8s-pod-network.f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" host="ip-172-31-18-8" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.327 [INFO][4660] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.43.5/26] block=192.168.43.0/26 handle="k8s-pod-network.f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" host="ip-172-31-18-8" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.327 [INFO][4660] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.5/26] handle="k8s-pod-network.f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" host="ip-172-31-18-8" Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.327 [INFO][4660] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:34.474474 env[1740]: 2024-12-13 02:22:34.327 [INFO][4660] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.5/26] IPv6=[] ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" HandleID="k8s-pod-network.f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:34.476435 env[1740]: 2024-12-13 02:22:34.330 [INFO][4643] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t95v7" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7b2ece73-537c-4b92-90c7-5f2bf4bedeb6", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 21, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"", Pod:"coredns-7db6d8ff4d-t95v7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6e5d182c100", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:34.476435 env[1740]: 2024-12-13 02:22:34.330 [INFO][4643] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.43.5/32] ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t95v7" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:34.476435 env[1740]: 2024-12-13 02:22:34.330 [INFO][4643] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6e5d182c100 ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t95v7" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:34.476435 env[1740]: 2024-12-13 02:22:34.397 [INFO][4643] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t95v7" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:34.476435 env[1740]: 2024-12-13 02:22:34.398 [INFO][4643] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t95v7" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7b2ece73-537c-4b92-90c7-5f2bf4bedeb6", ResourceVersion:"803", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 21, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2", Pod:"coredns-7db6d8ff4d-t95v7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6e5d182c100", MAC:"32:4f:d7:ac:8e:a9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:34.476435 env[1740]: 2024-12-13 02:22:34.470 [INFO][4643] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2" Namespace="kube-system" Pod="coredns-7db6d8ff4d-t95v7" WorkloadEndpoint="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:34.513208 env[1740]: time="2024-12-13T02:22:34.511333385Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:22:34.513208 env[1740]: time="2024-12-13T02:22:34.511396656Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:22:34.513208 env[1740]: time="2024-12-13T02:22:34.511410499Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:22:34.513208 env[1740]: time="2024-12-13T02:22:34.511636921Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2 pid=4741 runtime=io.containerd.runc.v2 Dec 13 02:22:34.542000 audit[4759]: NETFILTER_CFG table=filter:109 family=2 entries=42 op=nft_register_chain pid=4759 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:34.542000 audit[4759]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7ffe093c5850 a2=0 a3=7ffe093c583c items=0 ppid=3973 pid=4759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:34.542000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:34.590614 systemd[1]: Started cri-containerd-f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2.scope. Dec 13 02:22:34.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.663000 audit: BPF prog-id=181 op=LOAD Dec 13 02:22:34.667000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.667000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4741 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:34.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635663132336632643730653366383937353466303564383238396433 Dec 13 02:22:34.670000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.670000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4741 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:34.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635663132336632643730653366383937353466303564383238396433 Dec 13 02:22:34.672000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.672000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.672000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.672000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.672000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.672000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.672000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.672000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.672000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.672000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.672000 audit: BPF prog-id=182 op=LOAD Dec 13 02:22:34.672000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c7620 items=0 ppid=4741 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:34.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635663132336632643730653366383937353466303564383238396433 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit: BPF prog-id=183 op=LOAD Dec 13 02:22:34.673000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c7668 items=0 ppid=4741 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:34.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635663132336632643730653366383937353466303564383238396433 Dec 13 02:22:34.673000 audit: BPF prog-id=183 op=UNLOAD Dec 13 02:22:34.673000 audit: BPF prog-id=182 op=UNLOAD Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:34.673000 audit: BPF prog-id=184 op=LOAD Dec 13 02:22:34.673000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002c7a78 items=0 ppid=4741 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:34.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635663132336632643730653366383937353466303564383238396433 Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.547 [INFO][4686] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.547 [INFO][4686] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" iface="eth0" netns="/var/run/netns/cni-a7a23402-1f7c-ab8d-5342-eea549d1e656" Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.548 [INFO][4686] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" iface="eth0" netns="/var/run/netns/cni-a7a23402-1f7c-ab8d-5342-eea549d1e656" Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.548 [INFO][4686] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" iface="eth0" netns="/var/run/netns/cni-a7a23402-1f7c-ab8d-5342-eea549d1e656" Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.549 [INFO][4686] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.549 [INFO][4686] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.663 [INFO][4760] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" HandleID="k8s-pod-network.ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.663 [INFO][4760] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.663 [INFO][4760] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.689 [WARNING][4760] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" HandleID="k8s-pod-network.ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.689 [INFO][4760] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" HandleID="k8s-pod-network.ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.695 [INFO][4760] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:34.703930 env[1740]: 2024-12-13 02:22:34.697 [INFO][4686] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:34.709377 env[1740]: time="2024-12-13T02:22:34.709323768Z" level=info msg="TearDown network for sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\" successfully" Dec 13 02:22:34.709545 env[1740]: time="2024-12-13T02:22:34.709526065Z" level=info msg="StopPodSandbox for \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\" returns successfully" Dec 13 02:22:34.711453 systemd[1]: run-netns-cni\x2da7a23402\x2d1f7c\x2dab8d\x2d5342\x2deea549d1e656.mount: Deactivated successfully. Dec 13 02:22:34.715204 env[1740]: time="2024-12-13T02:22:34.715154318Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96ff6ddd-dvjdm,Uid:3c02d7f4-63e8-4626-a30b-80b4b56398fd,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:22:34.820172 systemd-networkd[1470]: cali5a3385cf32e: Gained IPv6LL Dec 13 02:22:34.922522 env[1740]: time="2024-12-13T02:22:34.922374068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-t95v7,Uid:7b2ece73-537c-4b92-90c7-5f2bf4bedeb6,Namespace:kube-system,Attempt:1,} returns sandbox id \"f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2\"" Dec 13 02:22:34.960444 env[1740]: time="2024-12-13T02:22:34.959236269Z" level=info msg="CreateContainer within sandbox \"f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:22:35.014445 systemd-networkd[1470]: cali19ec73a8ec0: Gained IPv6LL Dec 13 02:22:35.118766 env[1740]: time="2024-12-13T02:22:35.118692328Z" level=info msg="CreateContainer within sandbox \"f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b49da197a77fb059e4abc842e9b4b96b0bb121a00380fdf58084422156e3ba8d\"" Dec 13 02:22:35.124889 env[1740]: time="2024-12-13T02:22:35.124555052Z" level=info msg="StartContainer for \"b49da197a77fb059e4abc842e9b4b96b0bb121a00380fdf58084422156e3ba8d\"" Dec 13 02:22:35.175691 systemd[1]: Started cri-containerd-b49da197a77fb059e4abc842e9b4b96b0bb121a00380fdf58084422156e3ba8d.scope. Dec 13 02:22:35.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.225000 audit: BPF prog-id=185 op=LOAD Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4741 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396461313937613737666230353965346162633834326539623462 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4741 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396461313937613737666230353965346162633834326539623462 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit: BPF prog-id=186 op=LOAD Dec 13 02:22:35.226000 audit[4814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d4a30 items=0 ppid=4741 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396461313937613737666230353965346162633834326539623462 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit: BPF prog-id=187 op=LOAD Dec 13 02:22:35.226000 audit[4814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d4a78 items=0 ppid=4741 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396461313937613737666230353965346162633834326539623462 Dec 13 02:22:35.226000 audit: BPF prog-id=187 op=UNLOAD Dec 13 02:22:35.226000 audit: BPF prog-id=186 op=UNLOAD Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { perfmon } for pid=4814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit[4814]: AVC avc: denied { bpf } for pid=4814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.226000 audit: BPF prog-id=188 op=LOAD Dec 13 02:22:35.226000 audit[4814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d4e88 items=0 ppid=4741 pid=4814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396461313937613737666230353965346162633834326539623462 Dec 13 02:22:35.265854 env[1740]: time="2024-12-13T02:22:35.265538606Z" level=info msg="StartContainer for \"b49da197a77fb059e4abc842e9b4b96b0bb121a00380fdf58084422156e3ba8d\" returns successfully" Dec 13 02:22:35.378925 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:22:35.379047 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicd8ca6bc6a8: link becomes ready Dec 13 02:22:35.385817 systemd-networkd[1470]: calicd8ca6bc6a8: Link UP Dec 13 02:22:35.390707 systemd-networkd[1470]: calicd8ca6bc6a8: Gained carrier Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:34.949 [INFO][4780] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0 calico-apiserver-7f96ff6ddd- calico-apiserver 3c02d7f4-63e8-4626-a30b-80b4b56398fd 844 0 2024-12-13 02:22:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7f96ff6ddd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-18-8 calico-apiserver-7f96ff6ddd-dvjdm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calicd8ca6bc6a8 [] []}} ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-dvjdm" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:34.949 [INFO][4780] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-dvjdm" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.108 [INFO][4798] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" HandleID="k8s-pod-network.96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.192 [INFO][4798] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" HandleID="k8s-pod-network.96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312ef0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-18-8", "pod":"calico-apiserver-7f96ff6ddd-dvjdm", "timestamp":"2024-12-13 02:22:35.10861231 +0000 UTC"}, Hostname:"ip-172-31-18-8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.192 [INFO][4798] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.192 [INFO][4798] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.192 [INFO][4798] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-8' Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.205 [INFO][4798] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" host="ip-172-31-18-8" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.233 [INFO][4798] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-8" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.279 [INFO][4798] ipam/ipam.go 489: Trying affinity for 192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.292 [INFO][4798] ipam/ipam.go 155: Attempting to load block cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.314 [INFO][4798] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.43.0/26 host="ip-172-31-18-8" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.314 [INFO][4798] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.43.0/26 handle="k8s-pod-network.96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" host="ip-172-31-18-8" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.318 [INFO][4798] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8 Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.338 [INFO][4798] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.43.0/26 handle="k8s-pod-network.96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" host="ip-172-31-18-8" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.361 [INFO][4798] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.43.6/26] block=192.168.43.0/26 handle="k8s-pod-network.96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" host="ip-172-31-18-8" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.361 [INFO][4798] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.43.6/26] handle="k8s-pod-network.96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" host="ip-172-31-18-8" Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.361 [INFO][4798] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:35.457023 env[1740]: 2024-12-13 02:22:35.361 [INFO][4798] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.43.6/26] IPv6=[] ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" HandleID="k8s-pod-network.96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:35.459114 env[1740]: 2024-12-13 02:22:35.372 [INFO][4780] cni-plugin/k8s.go 386: Populated endpoint ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-dvjdm" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0", GenerateName:"calico-apiserver-7f96ff6ddd-", Namespace:"calico-apiserver", SelfLink:"", UID:"3c02d7f4-63e8-4626-a30b-80b4b56398fd", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96ff6ddd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"", Pod:"calico-apiserver-7f96ff6ddd-dvjdm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicd8ca6bc6a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:35.459114 env[1740]: 2024-12-13 02:22:35.372 [INFO][4780] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.43.6/32] ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-dvjdm" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:35.459114 env[1740]: 2024-12-13 02:22:35.372 [INFO][4780] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicd8ca6bc6a8 ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-dvjdm" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:35.459114 env[1740]: 2024-12-13 02:22:35.379 [INFO][4780] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-dvjdm" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:35.459114 env[1740]: 2024-12-13 02:22:35.379 [INFO][4780] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-dvjdm" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0", GenerateName:"calico-apiserver-7f96ff6ddd-", Namespace:"calico-apiserver", SelfLink:"", UID:"3c02d7f4-63e8-4626-a30b-80b4b56398fd", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96ff6ddd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8", Pod:"calico-apiserver-7f96ff6ddd-dvjdm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicd8ca6bc6a8", MAC:"ca:ef:35:48:9a:1d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:35.459114 env[1740]: 2024-12-13 02:22:35.446 [INFO][4780] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8" Namespace="calico-apiserver" Pod="calico-apiserver-7f96ff6ddd-dvjdm" WorkloadEndpoint="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:35.499416 env[1740]: time="2024-12-13T02:22:35.499310740Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:22:35.499699 env[1740]: time="2024-12-13T02:22:35.499462931Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:22:35.499699 env[1740]: time="2024-12-13T02:22:35.499639206Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:22:35.500511 env[1740]: time="2024-12-13T02:22:35.499892101Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8 pid=4869 runtime=io.containerd.runc.v2 Dec 13 02:22:35.530000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:35.530000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eb10e0 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:22:35.530000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:22:35.530000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:35.530000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ea5d60 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:22:35.530000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:22:35.539163 systemd[1]: Started cri-containerd-96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8.scope. Dec 13 02:22:35.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.627000 audit: BPF prog-id=189 op=LOAD Dec 13 02:22:35.629000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.629000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4869 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936653530376439393364636138303337336465353763633033656463 Dec 13 02:22:35.629000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.629000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4869 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936653530376439393364636138303337336465353763633033656463 Dec 13 02:22:35.630000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.630000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.630000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.630000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.630000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.630000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.630000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.630000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.630000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.630000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.630000 audit: BPF prog-id=190 op=LOAD Dec 13 02:22:35.630000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001c9420 items=0 ppid=4869 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936653530376439393364636138303337336465353763633033656463 Dec 13 02:22:35.631000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.631000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.631000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.631000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.631000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.631000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.631000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.631000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.631000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.631000 audit: BPF prog-id=191 op=LOAD Dec 13 02:22:35.631000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001c9468 items=0 ppid=4869 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936653530376439393364636138303337336465353763633033656463 Dec 13 02:22:35.662000 audit: BPF prog-id=191 op=UNLOAD Dec 13 02:22:35.663000 audit: BPF prog-id=190 op=UNLOAD Dec 13 02:22:35.663000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.663000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.663000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.663000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.663000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.663000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.663000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.663000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.663000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.663000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:35.663000 audit: BPF prog-id=192 op=LOAD Dec 13 02:22:35.663000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001c9878 items=0 ppid=4869 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936653530376439393364636138303337336465353763633033656463 Dec 13 02:22:35.789000 audit[4905]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:35.789000 audit[4905]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc4224ab50 a2=0 a3=7ffc4224ab3c items=0 ppid=2987 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:35.803000 audit[4905]: NETFILTER_CFG table=nat:111 family=2 entries=44 op=nft_register_rule pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:35.809997 sshd[4659]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:35.811000 audit[4659]: USER_END pid=4659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:35.814000 audit[4659]: CRED_DISP pid=4659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:35.821383 systemd-logind[1734]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:22:35.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.18.8:22-139.178.68.195:33170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:35.823686 systemd[1]: sshd@7-172.31.18.8:22-139.178.68.195:33170.service: Deactivated successfully. Dec 13 02:22:35.827004 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:22:35.872264 systemd-logind[1734]: Removed session 8. Dec 13 02:22:35.803000 audit[4905]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc4224ab50 a2=0 a3=7ffc4224ab3c items=0 ppid=2987 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.803000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:35.952192 env[1740]: time="2024-12-13T02:22:35.950232195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96ff6ddd-dvjdm,Uid:3c02d7f4-63e8-4626-a30b-80b4b56398fd,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8\"" Dec 13 02:22:35.996000 audit[4914]: NETFILTER_CFG table=filter:112 family=2 entries=50 op=nft_register_chain pid=4914 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:22:35.996000 audit[4914]: SYSCALL arch=c000003e syscall=46 success=yes exit=25080 a0=3 a1=7fff1577a490 a2=0 a3=7fff1577a47c items=0 ppid=3973 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:35.996000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:22:36.354029 systemd-networkd[1470]: cali6e5d182c100: Gained IPv6LL Dec 13 02:22:36.491790 kubelet[2815]: I1213 02:22:36.491681 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-t95v7" podStartSLOduration=43.49165079 podStartE2EDuration="43.49165079s" podCreationTimestamp="2024-12-13 02:21:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:22:35.559677764 +0000 UTC m=+53.862206209" watchObservedRunningTime="2024-12-13 02:22:36.49165079 +0000 UTC m=+54.794179224" Dec 13 02:22:36.525912 env[1740]: time="2024-12-13T02:22:36.524837990Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.531583 env[1740]: time="2024-12-13T02:22:36.531533844Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.537205 env[1740]: time="2024-12-13T02:22:36.537145504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.542000 audit[4916]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:36.542000 audit[4916]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd80f092b0 a2=0 a3=7ffd80f0929c items=0 ppid=2987 pid=4916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.542000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:36.549584 env[1740]: time="2024-12-13T02:22:36.549525704Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:36.550388 env[1740]: time="2024-12-13T02:22:36.550344587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:22:36.552992 env[1740]: time="2024-12-13T02:22:36.552953146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:22:36.556586 env[1740]: time="2024-12-13T02:22:36.556539669Z" level=info msg="CreateContainer within sandbox \"514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:22:36.572000 audit[4916]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:36.572000 audit[4916]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd80f092b0 a2=0 a3=7ffd80f0929c items=0 ppid=2987 pid=4916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.572000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:36.655446 env[1740]: time="2024-12-13T02:22:36.655325167Z" level=info msg="CreateContainer within sandbox \"514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"56403143c8d575bfd1e98a6b6b941ed48264113bc9f10b8aa48dbe359f2e70f2\"" Dec 13 02:22:36.656846 env[1740]: time="2024-12-13T02:22:36.656688934Z" level=info msg="StartContainer for \"56403143c8d575bfd1e98a6b6b941ed48264113bc9f10b8aa48dbe359f2e70f2\"" Dec 13 02:22:36.660000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:36.660000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00a24bbe0 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:22:36.660000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:22:36.660000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:36.660000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00a6b5320 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:22:36.660000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:22:36.663000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:36.663000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00ba94ed0 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:22:36.663000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:22:36.666000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:36.666000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00ba94f00 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:22:36.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:22:36.674000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:36.674000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00a38ea60 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:22:36.674000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:22:36.674000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:36.674000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00ba95110 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:22:36.674000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:22:36.701582 systemd[1]: run-containerd-runc-k8s.io-56403143c8d575bfd1e98a6b6b941ed48264113bc9f10b8aa48dbe359f2e70f2-runc.9uYJNi.mount: Deactivated successfully. Dec 13 02:22:36.705513 systemd[1]: Started cri-containerd-56403143c8d575bfd1e98a6b6b941ed48264113bc9f10b8aa48dbe359f2e70f2.scope. Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f3c517f93c8 items=0 ppid=4233 pid=4925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343033313433633864353735626664316539386136623662393431 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit: BPF prog-id=193 op=LOAD Dec 13 02:22:36.744000 audit[4925]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000350108 items=0 ppid=4233 pid=4925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343033313433633864353735626664316539386136623662393431 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit: BPF prog-id=194 op=LOAD Dec 13 02:22:36.744000 audit[4925]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000350158 items=0 ppid=4233 pid=4925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343033313433633864353735626664316539386136623662393431 Dec 13 02:22:36.744000 audit: BPF prog-id=194 op=UNLOAD Dec 13 02:22:36.744000 audit: BPF prog-id=193 op=UNLOAD Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:36.744000 audit: BPF prog-id=195 op=LOAD Dec 13 02:22:36.744000 audit[4925]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003501e8 items=0 ppid=4233 pid=4925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:36.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536343033313433633864353735626664316539386136623662393431 Dec 13 02:22:36.776387 env[1740]: time="2024-12-13T02:22:36.776314890Z" level=info msg="StartContainer for \"56403143c8d575bfd1e98a6b6b941ed48264113bc9f10b8aa48dbe359f2e70f2\" returns successfully" Dec 13 02:22:36.865018 systemd-networkd[1470]: calicd8ca6bc6a8: Gained IPv6LL Dec 13 02:22:37.306106 kubelet[2815]: I1213 02:22:37.306055 2815 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:22:37.306389 kubelet[2815]: I1213 02:22:37.306363 2815 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:22:39.141000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:39.144102 kernel: kauditd_printk_skb: 432 callbacks suppressed Dec 13 02:22:39.144225 kernel: audit: type=1400 audit(1734056559.141:1287): avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:39.141000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d3cfc0 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:22:39.153923 kernel: audit: type=1300 audit(1734056559.141:1287): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d3cfc0 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:22:39.141000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:22:39.161955 kernel: audit: type=1327 audit(1734056559.141:1287): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:22:39.143000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:39.173444 kernel: audit: type=1400 audit(1734056559.143:1288): avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:39.173719 kernel: audit: type=1300 audit(1734056559.143:1288): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d3cfe0 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:22:39.143000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d3cfe0 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:22:39.143000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:22:39.184067 kernel: audit: type=1327 audit(1734056559.143:1288): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:22:39.184209 kernel: audit: type=1400 audit(1734056559.143:1289): avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:39.143000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:39.190464 kernel: audit: type=1300 audit(1734056559.143:1289): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ae3200 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:22:39.143000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ae3200 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:22:39.195971 kernel: audit: type=1327 audit(1734056559.143:1289): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:22:39.143000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:22:39.147000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:39.200852 kernel: audit: type=1400 audit(1734056559.147:1290): avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:22:39.147000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ae3260 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:22:39.147000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:22:40.324061 env[1740]: time="2024-12-13T02:22:40.324005265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:40.330921 env[1740]: time="2024-12-13T02:22:40.329883656Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:40.336389 env[1740]: time="2024-12-13T02:22:40.336343057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:40.339396 env[1740]: time="2024-12-13T02:22:40.339350101Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:40.341181 env[1740]: time="2024-12-13T02:22:40.340781935Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:22:40.349472 env[1740]: time="2024-12-13T02:22:40.349344432Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:22:40.356046 env[1740]: time="2024-12-13T02:22:40.355159183Z" level=info msg="CreateContainer within sandbox \"25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:22:40.388984 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3448205910.mount: Deactivated successfully. Dec 13 02:22:40.399270 env[1740]: time="2024-12-13T02:22:40.399189677Z" level=info msg="CreateContainer within sandbox \"25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2ccb8bf51e3ecff804b26df9058160e6ee12d80e2c56b24bb5cfad215e143b6e\"" Dec 13 02:22:40.400579 env[1740]: time="2024-12-13T02:22:40.400540926Z" level=info msg="StartContainer for \"2ccb8bf51e3ecff804b26df9058160e6ee12d80e2c56b24bb5cfad215e143b6e\"" Dec 13 02:22:40.470659 systemd[1]: run-containerd-runc-k8s.io-2ccb8bf51e3ecff804b26df9058160e6ee12d80e2c56b24bb5cfad215e143b6e-runc.oa8dgk.mount: Deactivated successfully. Dec 13 02:22:40.486671 systemd[1]: Started cri-containerd-2ccb8bf51e3ecff804b26df9058160e6ee12d80e2c56b24bb5cfad215e143b6e.scope. Dec 13 02:22:40.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.523000 audit: BPF prog-id=196 op=LOAD Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4523 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263636238626635316533656366663830346232366466393035383136 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4523 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263636238626635316533656366663830346232366466393035383136 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.524000 audit: BPF prog-id=197 op=LOAD Dec 13 02:22:40.524000 audit[4966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000339db0 items=0 ppid=4523 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263636238626635316533656366663830346232366466393035383136 Dec 13 02:22:40.525000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.525000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.525000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.525000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.525000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.525000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.525000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.525000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.525000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.525000 audit: BPF prog-id=198 op=LOAD Dec 13 02:22:40.525000 audit[4966]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000339df8 items=0 ppid=4523 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263636238626635316533656366663830346232366466393035383136 Dec 13 02:22:40.526000 audit: BPF prog-id=198 op=UNLOAD Dec 13 02:22:40.526000 audit: BPF prog-id=197 op=UNLOAD Dec 13 02:22:40.526000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.526000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.526000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.526000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.526000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.526000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.526000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.526000 audit[4966]: AVC avc: denied { perfmon } for pid=4966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.526000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.526000 audit[4966]: AVC avc: denied { bpf } for pid=4966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:40.526000 audit: BPF prog-id=199 op=LOAD Dec 13 02:22:40.526000 audit[4966]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003a8208 items=0 ppid=4523 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:40.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263636238626635316533656366663830346232366466393035383136 Dec 13 02:22:40.599557 env[1740]: time="2024-12-13T02:22:40.579003884Z" level=info msg="StartContainer for \"2ccb8bf51e3ecff804b26df9058160e6ee12d80e2c56b24bb5cfad215e143b6e\" returns successfully" Dec 13 02:22:40.850681 systemd[1]: Started sshd@8-172.31.18.8:22-139.178.68.195:43882.service. Dec 13 02:22:40.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.18.8:22-139.178.68.195:43882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:41.101000 audit[4998]: USER_ACCT pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:41.103797 sshd[4998]: Accepted publickey for core from 139.178.68.195 port 43882 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:41.104000 audit[4998]: CRED_ACQ pid=4998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:41.104000 audit[4998]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2e5f0060 a2=3 a3=0 items=0 ppid=1 pid=4998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:41.104000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:22:41.112327 sshd[4998]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:41.123132 systemd[1]: Started session-9.scope. Dec 13 02:22:41.125120 systemd-logind[1734]: New session 9 of user core. Dec 13 02:22:41.134000 audit[4998]: USER_START pid=4998 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:41.138000 audit[5002]: CRED_ACQ pid=5002 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:41.529454 kubelet[2815]: I1213 02:22:41.528760 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-k56lm" podStartSLOduration=32.123081369 podStartE2EDuration="37.528734315s" podCreationTimestamp="2024-12-13 02:22:04 +0000 UTC" firstStartedPulling="2024-12-13 02:22:31.146389493 +0000 UTC m=+49.448917909" lastFinishedPulling="2024-12-13 02:22:36.552042453 +0000 UTC m=+54.854570855" observedRunningTime="2024-12-13 02:22:37.478845664 +0000 UTC m=+55.781374085" watchObservedRunningTime="2024-12-13 02:22:41.528734315 +0000 UTC m=+59.831262742" Dec 13 02:22:41.851000 audit[5013]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:41.851000 audit[5013]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe5d9418d0 a2=0 a3=7ffe5d9418bc items=0 ppid=2987 pid=5013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:41.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:41.860000 audit[5013]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5013 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:41.860000 audit[5013]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe5d9418d0 a2=0 a3=7ffe5d9418bc items=0 ppid=2987 pid=5013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:41.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:41.921106 sshd[4998]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:41.922000 audit[4998]: USER_END pid=4998 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:41.923000 audit[4998]: CRED_DISP pid=4998 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:41.927309 systemd[1]: sshd@8-172.31.18.8:22-139.178.68.195:43882.service: Deactivated successfully. Dec 13 02:22:41.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.18.8:22-139.178.68.195:43882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:41.928452 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:22:41.931201 systemd-logind[1734]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:22:41.932351 systemd-logind[1734]: Removed session 9. Dec 13 02:22:42.057137 env[1740]: time="2024-12-13T02:22:42.057100934Z" level=info msg="StopPodSandbox for \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\"" Dec 13 02:22:42.259025 systemd[1]: run-containerd-runc-k8s.io-7deba822c9fa6781bde666befbe9494f39b2897668fa21642489e0d38d418dfe-runc.skIYHq.mount: Deactivated successfully. Dec 13 02:22:42.498000 audit[4977]: AVC avc: denied { watch } for pid=4977 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_22_17.3007668750/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c245,c696 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c245,c696 tclass=file permissive=0 Dec 13 02:22:42.498000 audit[4977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003b34a0 a2=fc6 a3=0 items=0 ppid=4523 pid=4977 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c245,c696 key=(null) Dec 13 02:22:42.498000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:22:42.504874 kubelet[2815]: I1213 02:22:42.504584 2815 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.359 [WARNING][5029] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0", GenerateName:"calico-apiserver-7f96ff6ddd-", Namespace:"calico-apiserver", SelfLink:"", UID:"217fa5a0-a100-45e7-acaa-349611b79451", ResourceVersion:"907", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96ff6ddd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd", Pod:"calico-apiserver-7f96ff6ddd-bnmxs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5a3385cf32e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.361 [INFO][5029] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.361 [INFO][5029] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" iface="eth0" netns="" Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.361 [INFO][5029] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.361 [INFO][5029] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.484 [INFO][5054] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" HandleID="k8s-pod-network.a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.485 [INFO][5054] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.485 [INFO][5054] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.501 [WARNING][5054] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" HandleID="k8s-pod-network.a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.501 [INFO][5054] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" HandleID="k8s-pod-network.a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.513 [INFO][5054] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:42.524284 env[1740]: 2024-12-13 02:22:42.520 [INFO][5029] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:42.525371 env[1740]: time="2024-12-13T02:22:42.525324008Z" level=info msg="TearDown network for sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\" successfully" Dec 13 02:22:42.525495 env[1740]: time="2024-12-13T02:22:42.525469279Z" level=info msg="StopPodSandbox for \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\" returns successfully" Dec 13 02:22:42.526284 env[1740]: time="2024-12-13T02:22:42.526254423Z" level=info msg="RemovePodSandbox for \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\"" Dec 13 02:22:42.526575 env[1740]: time="2024-12-13T02:22:42.526520650Z" level=info msg="Forcibly stopping sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\"" Dec 13 02:22:42.603365 kubelet[2815]: I1213 02:22:42.603087 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7f96ff6ddd-bnmxs" podStartSLOduration=33.586386426 podStartE2EDuration="39.603058788s" podCreationTimestamp="2024-12-13 02:22:03 +0000 UTC" firstStartedPulling="2024-12-13 02:22:34.326459876 +0000 UTC m=+52.628988290" lastFinishedPulling="2024-12-13 02:22:40.343132231 +0000 UTC m=+58.645660652" observedRunningTime="2024-12-13 02:22:41.530278367 +0000 UTC m=+59.832806791" watchObservedRunningTime="2024-12-13 02:22:42.603058788 +0000 UTC m=+60.905587213" Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.655 [WARNING][5073] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0", GenerateName:"calico-apiserver-7f96ff6ddd-", Namespace:"calico-apiserver", SelfLink:"", UID:"217fa5a0-a100-45e7-acaa-349611b79451", ResourceVersion:"907", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96ff6ddd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"25d9851f11ab83f09e06d8276576c1d680315c9cc5332bbfa55cf36f6b2496dd", Pod:"calico-apiserver-7f96ff6ddd-bnmxs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5a3385cf32e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.656 [INFO][5073] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.656 [INFO][5073] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" iface="eth0" netns="" Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.656 [INFO][5073] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.656 [INFO][5073] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.695 [INFO][5081] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" HandleID="k8s-pod-network.a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.695 [INFO][5081] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.695 [INFO][5081] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.704 [WARNING][5081] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" HandleID="k8s-pod-network.a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.704 [INFO][5081] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" HandleID="k8s-pod-network.a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--bnmxs-eth0" Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.707 [INFO][5081] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:42.713269 env[1740]: 2024-12-13 02:22:42.710 [INFO][5073] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563" Dec 13 02:22:42.715384 env[1740]: time="2024-12-13T02:22:42.713324404Z" level=info msg="TearDown network for sandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\" successfully" Dec 13 02:22:42.722057 env[1740]: time="2024-12-13T02:22:42.722001509Z" level=info msg="RemovePodSandbox \"a7f11374561c0f08cf7fe89f055ebf0c3d6d30bb25e0fdf0bf9f990437209563\" returns successfully" Dec 13 02:22:42.722651 env[1740]: time="2024-12-13T02:22:42.722618119Z" level=info msg="StopPodSandbox for \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\"" Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.775 [WARNING][5100] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7822b25-c667-4562-ab76-c70c9147bb14", ResourceVersion:"878", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae", Pod:"csi-node-driver-k56lm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali81e90d35e5a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.775 [INFO][5100] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.775 [INFO][5100] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" iface="eth0" netns="" Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.775 [INFO][5100] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.775 [INFO][5100] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.806 [INFO][5106] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" HandleID="k8s-pod-network.c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.806 [INFO][5106] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.806 [INFO][5106] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.828 [WARNING][5106] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" HandleID="k8s-pod-network.c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.828 [INFO][5106] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" HandleID="k8s-pod-network.c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.855 [INFO][5106] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:42.867458 env[1740]: 2024-12-13 02:22:42.860 [INFO][5100] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:42.868518 env[1740]: time="2024-12-13T02:22:42.868458206Z" level=info msg="TearDown network for sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\" successfully" Dec 13 02:22:42.868518 env[1740]: time="2024-12-13T02:22:42.868514610Z" level=info msg="StopPodSandbox for \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\" returns successfully" Dec 13 02:22:42.871422 env[1740]: time="2024-12-13T02:22:42.871345471Z" level=info msg="RemovePodSandbox for \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\"" Dec 13 02:22:42.871580 env[1740]: time="2024-12-13T02:22:42.871406717Z" level=info msg="Forcibly stopping sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\"" Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.923 [WARNING][5125] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b7822b25-c667-4562-ab76-c70c9147bb14", ResourceVersion:"878", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"514f8815fbc650e9a361cf5de93d26387afc0bf316344185c3164c2324019cae", Pod:"csi-node-driver-k56lm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.43.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali81e90d35e5a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.923 [INFO][5125] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.923 [INFO][5125] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" iface="eth0" netns="" Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.923 [INFO][5125] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.923 [INFO][5125] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.955 [INFO][5131] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" HandleID="k8s-pod-network.c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.955 [INFO][5131] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.956 [INFO][5131] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.964 [WARNING][5131] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" HandleID="k8s-pod-network.c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.964 [INFO][5131] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" HandleID="k8s-pod-network.c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Workload="ip--172--31--18--8-k8s-csi--node--driver--k56lm-eth0" Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.966 [INFO][5131] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:42.970617 env[1740]: 2024-12-13 02:22:42.968 [INFO][5125] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632" Dec 13 02:22:42.971402 env[1740]: time="2024-12-13T02:22:42.970646918Z" level=info msg="TearDown network for sandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\" successfully" Dec 13 02:22:42.977045 env[1740]: time="2024-12-13T02:22:42.976969251Z" level=info msg="RemovePodSandbox \"c6f49ffab525985701236dfc04e9b1199bab816f7131b4133e05c7d883c9e632\" returns successfully" Dec 13 02:22:42.977969 env[1740]: time="2024-12-13T02:22:42.977932791Z" level=info msg="StopPodSandbox for \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\"" Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.030 [WARNING][5150] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 21, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4", Pod:"coredns-7db6d8ff4d-5nh99", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid48cb2d0f1d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.031 [INFO][5150] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.031 [INFO][5150] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" iface="eth0" netns="" Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.031 [INFO][5150] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.031 [INFO][5150] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.063 [INFO][5156] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" HandleID="k8s-pod-network.d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.064 [INFO][5156] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.064 [INFO][5156] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.070 [WARNING][5156] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" HandleID="k8s-pod-network.d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.070 [INFO][5156] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" HandleID="k8s-pod-network.d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.072 [INFO][5156] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:43.077333 env[1740]: 2024-12-13 02:22:43.074 [INFO][5150] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:43.078804 env[1740]: time="2024-12-13T02:22:43.077485076Z" level=info msg="TearDown network for sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\" successfully" Dec 13 02:22:43.078804 env[1740]: time="2024-12-13T02:22:43.077525425Z" level=info msg="StopPodSandbox for \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\" returns successfully" Dec 13 02:22:43.078804 env[1740]: time="2024-12-13T02:22:43.078447412Z" level=info msg="RemovePodSandbox for \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\"" Dec 13 02:22:43.078804 env[1740]: time="2024-12-13T02:22:43.078507902Z" level=info msg="Forcibly stopping sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\"" Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.134 [WARNING][5176] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d2ac8cbc-55b4-4f4b-a8ef-b2060cf295ff", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 21, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"8788492da78a16068b217a168145f1d7a19c480b4e34f2cd542a5f32d1f6f6a4", Pod:"coredns-7db6d8ff4d-5nh99", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid48cb2d0f1d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.135 [INFO][5176] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.135 [INFO][5176] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" iface="eth0" netns="" Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.135 [INFO][5176] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.135 [INFO][5176] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.173 [INFO][5183] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" HandleID="k8s-pod-network.d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.174 [INFO][5183] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.174 [INFO][5183] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.181 [WARNING][5183] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" HandleID="k8s-pod-network.d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.181 [INFO][5183] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" HandleID="k8s-pod-network.d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--5nh99-eth0" Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.183 [INFO][5183] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:43.190948 env[1740]: 2024-12-13 02:22:43.185 [INFO][5176] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b" Dec 13 02:22:43.190948 env[1740]: time="2024-12-13T02:22:43.188011178Z" level=info msg="TearDown network for sandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\" successfully" Dec 13 02:22:43.196466 env[1740]: time="2024-12-13T02:22:43.196394091Z" level=info msg="RemovePodSandbox \"d561cf062d19c98afd6e86af96db027e9fbcd17e6f5d44ca782cd8864d4e8f4b\" returns successfully" Dec 13 02:22:43.197373 env[1740]: time="2024-12-13T02:22:43.197261069Z" level=info msg="StopPodSandbox for \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\"" Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.255 [WARNING][5201] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7b2ece73-537c-4b92-90c7-5f2bf4bedeb6", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 21, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2", Pod:"coredns-7db6d8ff4d-t95v7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6e5d182c100", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.255 [INFO][5201] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.256 [INFO][5201] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" iface="eth0" netns="" Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.256 [INFO][5201] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.256 [INFO][5201] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.289 [INFO][5207] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" HandleID="k8s-pod-network.01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.289 [INFO][5207] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.289 [INFO][5207] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.302 [WARNING][5207] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" HandleID="k8s-pod-network.01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.302 [INFO][5207] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" HandleID="k8s-pod-network.01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.305 [INFO][5207] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:43.309635 env[1740]: 2024-12-13 02:22:43.307 [INFO][5201] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:43.310627 env[1740]: time="2024-12-13T02:22:43.309673274Z" level=info msg="TearDown network for sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\" successfully" Dec 13 02:22:43.310627 env[1740]: time="2024-12-13T02:22:43.309714907Z" level=info msg="StopPodSandbox for \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\" returns successfully" Dec 13 02:22:43.310773 env[1740]: time="2024-12-13T02:22:43.310734261Z" level=info msg="RemovePodSandbox for \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\"" Dec 13 02:22:43.310854 env[1740]: time="2024-12-13T02:22:43.310781460Z" level=info msg="Forcibly stopping sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\"" Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.379 [WARNING][5225] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7b2ece73-537c-4b92-90c7-5f2bf4bedeb6", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 21, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"f5f123f2d70e3f89754f05d8289d36bdbf5509b9d307bb81609e982613fbfbc2", Pod:"coredns-7db6d8ff4d-t95v7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.43.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6e5d182c100", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.380 [INFO][5225] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.380 [INFO][5225] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" iface="eth0" netns="" Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.380 [INFO][5225] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.380 [INFO][5225] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.426 [INFO][5231] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" HandleID="k8s-pod-network.01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.426 [INFO][5231] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.428 [INFO][5231] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.443 [WARNING][5231] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" HandleID="k8s-pod-network.01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.444 [INFO][5231] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" HandleID="k8s-pod-network.01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Workload="ip--172--31--18--8-k8s-coredns--7db6d8ff4d--t95v7-eth0" Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.463 [INFO][5231] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:43.471339 env[1740]: 2024-12-13 02:22:43.467 [INFO][5225] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5" Dec 13 02:22:43.472682 env[1740]: time="2024-12-13T02:22:43.472634826Z" level=info msg="TearDown network for sandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\" successfully" Dec 13 02:22:43.480365 env[1740]: time="2024-12-13T02:22:43.480259633Z" level=info msg="RemovePodSandbox \"01540c32e61b742dfcf7db4983f8b0dc23b36c8e04004d2309fe1a1089d515c5\" returns successfully" Dec 13 02:22:43.481402 env[1740]: time="2024-12-13T02:22:43.481372113Z" level=info msg="StopPodSandbox for \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\"" Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.646 [WARNING][5253] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0", GenerateName:"calico-apiserver-7f96ff6ddd-", Namespace:"calico-apiserver", SelfLink:"", UID:"3c02d7f4-63e8-4626-a30b-80b4b56398fd", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96ff6ddd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8", Pod:"calico-apiserver-7f96ff6ddd-dvjdm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicd8ca6bc6a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.647 [INFO][5253] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.647 [INFO][5253] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" iface="eth0" netns="" Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.647 [INFO][5253] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.647 [INFO][5253] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.719 [INFO][5259] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" HandleID="k8s-pod-network.ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.720 [INFO][5259] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.720 [INFO][5259] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.726 [WARNING][5259] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" HandleID="k8s-pod-network.ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.727 [INFO][5259] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" HandleID="k8s-pod-network.ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.729 [INFO][5259] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:43.734271 env[1740]: 2024-12-13 02:22:43.732 [INFO][5253] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:43.735145 env[1740]: time="2024-12-13T02:22:43.734225538Z" level=info msg="TearDown network for sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\" successfully" Dec 13 02:22:43.735145 env[1740]: time="2024-12-13T02:22:43.734558157Z" level=info msg="StopPodSandbox for \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\" returns successfully" Dec 13 02:22:43.735278 env[1740]: time="2024-12-13T02:22:43.735159143Z" level=info msg="RemovePodSandbox for \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\"" Dec 13 02:22:43.735278 env[1740]: time="2024-12-13T02:22:43.735215959Z" level=info msg="Forcibly stopping sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\"" Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.817 [WARNING][5277] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0", GenerateName:"calico-apiserver-7f96ff6ddd-", Namespace:"calico-apiserver", SelfLink:"", UID:"3c02d7f4-63e8-4626-a30b-80b4b56398fd", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96ff6ddd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8", Pod:"calico-apiserver-7f96ff6ddd-dvjdm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.43.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calicd8ca6bc6a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.817 [INFO][5277] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.817 [INFO][5277] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" iface="eth0" netns="" Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.817 [INFO][5277] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.817 [INFO][5277] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.874 [INFO][5283] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" HandleID="k8s-pod-network.ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.874 [INFO][5283] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.874 [INFO][5283] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.883 [WARNING][5283] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" HandleID="k8s-pod-network.ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.883 [INFO][5283] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" HandleID="k8s-pod-network.ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Workload="ip--172--31--18--8-k8s-calico--apiserver--7f96ff6ddd--dvjdm-eth0" Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.885 [INFO][5283] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:43.891051 env[1740]: 2024-12-13 02:22:43.888 [INFO][5277] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5" Dec 13 02:22:43.891863 env[1740]: time="2024-12-13T02:22:43.891097670Z" level=info msg="TearDown network for sandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\" successfully" Dec 13 02:22:43.898310 env[1740]: time="2024-12-13T02:22:43.898257404Z" level=info msg="RemovePodSandbox \"ce61ce8eb70c191ac9c13520da625e1210007b681b1880322ef1379cbb3498d5\" returns successfully" Dec 13 02:22:43.899344 env[1740]: time="2024-12-13T02:22:43.899313589Z" level=info msg="StopPodSandbox for \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\"" Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.006 [WARNING][5303] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0", GenerateName:"calico-kube-controllers-dbfb5f45c-", Namespace:"calico-system", SelfLink:"", UID:"402a696b-090d-4af6-a484-ec67cf641104", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbfb5f45c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa", Pod:"calico-kube-controllers-dbfb5f45c-8kkfd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali19ec73a8ec0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.006 [INFO][5303] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.006 [INFO][5303] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" iface="eth0" netns="" Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.006 [INFO][5303] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.006 [INFO][5303] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.081 [INFO][5309] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" HandleID="k8s-pod-network.787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.082 [INFO][5309] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.082 [INFO][5309] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.090 [WARNING][5309] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" HandleID="k8s-pod-network.787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.091 [INFO][5309] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" HandleID="k8s-pod-network.787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.093 [INFO][5309] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:44.098179 env[1740]: 2024-12-13 02:22:44.096 [INFO][5303] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:44.099797 env[1740]: time="2024-12-13T02:22:44.099748245Z" level=info msg="TearDown network for sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\" successfully" Dec 13 02:22:44.099918 env[1740]: time="2024-12-13T02:22:44.099895920Z" level=info msg="StopPodSandbox for \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\" returns successfully" Dec 13 02:22:44.100819 env[1740]: time="2024-12-13T02:22:44.100791217Z" level=info msg="RemovePodSandbox for \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\"" Dec 13 02:22:44.101120 env[1740]: time="2024-12-13T02:22:44.101070334Z" level=info msg="Forcibly stopping sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\"" Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.213 [WARNING][5330] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0", GenerateName:"calico-kube-controllers-dbfb5f45c-", Namespace:"calico-system", SelfLink:"", UID:"402a696b-090d-4af6-a484-ec67cf641104", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 22, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbfb5f45c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-8", ContainerID:"f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa", Pod:"calico-kube-controllers-dbfb5f45c-8kkfd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.43.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali19ec73a8ec0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.213 [INFO][5330] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.214 [INFO][5330] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" iface="eth0" netns="" Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.214 [INFO][5330] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.214 [INFO][5330] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.268 [INFO][5336] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" HandleID="k8s-pod-network.787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.268 [INFO][5336] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.271 [INFO][5336] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.280 [WARNING][5336] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" HandleID="k8s-pod-network.787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.281 [INFO][5336] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" HandleID="k8s-pod-network.787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Workload="ip--172--31--18--8-k8s-calico--kube--controllers--dbfb5f45c--8kkfd-eth0" Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.287 [INFO][5336] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:22:44.292099 env[1740]: 2024-12-13 02:22:44.289 [INFO][5330] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca" Dec 13 02:22:44.293245 env[1740]: time="2024-12-13T02:22:44.292148538Z" level=info msg="TearDown network for sandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\" successfully" Dec 13 02:22:44.300073 env[1740]: time="2024-12-13T02:22:44.300013709Z" level=info msg="RemovePodSandbox \"787052bd008586a73922cacac47b2438d2e1ca8b4c4aaad12360271cc41cf4ca\" returns successfully" Dec 13 02:22:45.025075 env[1740]: time="2024-12-13T02:22:45.023668694Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:45.050033 env[1740]: time="2024-12-13T02:22:45.049968716Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:45.059743 env[1740]: time="2024-12-13T02:22:45.059457362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:45.066232 env[1740]: time="2024-12-13T02:22:45.066182159Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:45.067322 env[1740]: time="2024-12-13T02:22:45.066801496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:22:45.069033 env[1740]: time="2024-12-13T02:22:45.068997746Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:22:45.135318 env[1740]: time="2024-12-13T02:22:45.135270395Z" level=info msg="CreateContainer within sandbox \"f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:22:45.221440 env[1740]: time="2024-12-13T02:22:45.221372298Z" level=info msg="CreateContainer within sandbox \"f9397f0cc6b9ca3fc95a823e3c25e3cec975fe84d1067f7adb5d30bc84347daa\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"53ea0fe001543acdb8ce2bb668deefd85a2767de1d48f6f63ffdbe42446ce79c\"" Dec 13 02:22:45.224010 env[1740]: time="2024-12-13T02:22:45.222216608Z" level=info msg="StartContainer for \"53ea0fe001543acdb8ce2bb668deefd85a2767de1d48f6f63ffdbe42446ce79c\"" Dec 13 02:22:45.285726 systemd[1]: Started cri-containerd-53ea0fe001543acdb8ce2bb668deefd85a2767de1d48f6f63ffdbe42446ce79c.scope. Dec 13 02:22:45.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.315259 kernel: kauditd_printk_skb: 79 callbacks suppressed Dec 13 02:22:45.315382 kernel: audit: type=1400 audit(1734056565.312:1321): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.323268 kernel: audit: type=1400 audit(1734056565.312:1322): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.323413 kernel: audit: type=1400 audit(1734056565.312:1323): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.330970 kernel: audit: type=1400 audit(1734056565.312:1324): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.331120 kernel: audit: type=1400 audit(1734056565.312:1325): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.334876 kernel: audit: type=1400 audit(1734056565.312:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.340097 kernel: audit: type=1400 audit(1734056565.312:1327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.348932 kernel: audit: type=1400 audit(1734056565.312:1328): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.360612 kernel: audit: type=1400 audit(1734056565.312:1329): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.374904 kernel: audit: type=1400 audit(1734056565.312:1330): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit: BPF prog-id=200 op=LOAD Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4574 pid=5352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:45.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533656130666530303135343361636462386365326262363638646565 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4574 pid=5352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:45.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533656130666530303135343361636462386365326262363638646565 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.312000 audit: BPF prog-id=201 op=LOAD Dec 13 02:22:45.312000 audit[5352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003f61f0 items=0 ppid=4574 pid=5352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:45.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533656130666530303135343361636462386365326262363638646565 Dec 13 02:22:45.318000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.318000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.318000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.318000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.318000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.318000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.318000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.318000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.318000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.318000 audit: BPF prog-id=202 op=LOAD Dec 13 02:22:45.318000 audit[5352]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003f6238 items=0 ppid=4574 pid=5352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:45.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533656130666530303135343361636462386365326262363638646565 Dec 13 02:22:45.326000 audit: BPF prog-id=202 op=UNLOAD Dec 13 02:22:45.326000 audit: BPF prog-id=201 op=UNLOAD Dec 13 02:22:45.326000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.326000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.326000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.326000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.326000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.326000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.326000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.326000 audit[5352]: AVC avc: denied { perfmon } for pid=5352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.326000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.326000 audit[5352]: AVC avc: denied { bpf } for pid=5352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.326000 audit: BPF prog-id=203 op=LOAD Dec 13 02:22:45.326000 audit[5352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003f6648 items=0 ppid=4574 pid=5352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:45.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533656130666530303135343361636462386365326262363638646565 Dec 13 02:22:45.386425 env[1740]: time="2024-12-13T02:22:45.386303634Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:45.394462 env[1740]: time="2024-12-13T02:22:45.394337820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:45.399049 env[1740]: time="2024-12-13T02:22:45.399004782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:45.415915 env[1740]: time="2024-12-13T02:22:45.412980506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:22:45.415915 env[1740]: time="2024-12-13T02:22:45.414620423Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:22:45.423878 env[1740]: time="2024-12-13T02:22:45.423793049Z" level=info msg="CreateContainer within sandbox \"96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:22:45.432278 env[1740]: time="2024-12-13T02:22:45.432210330Z" level=info msg="StartContainer for \"53ea0fe001543acdb8ce2bb668deefd85a2767de1d48f6f63ffdbe42446ce79c\" returns successfully" Dec 13 02:22:45.457260 env[1740]: time="2024-12-13T02:22:45.457210136Z" level=info msg="CreateContainer within sandbox \"96e507d993dca80373de57cc03edcd2664915fbd0e4d1a9b50518947198d20e8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3edab329d8b288efa7c76c86a283fd8fec2cc599087668f80612a10c80733bf3\"" Dec 13 02:22:45.458661 env[1740]: time="2024-12-13T02:22:45.458618429Z" level=info msg="StartContainer for \"3edab329d8b288efa7c76c86a283fd8fec2cc599087668f80612a10c80733bf3\"" Dec 13 02:22:45.491923 systemd[1]: Started cri-containerd-3edab329d8b288efa7c76c86a283fd8fec2cc599087668f80612a10c80733bf3.scope. Dec 13 02:22:45.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.525000 audit: BPF prog-id=204 op=LOAD Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4869 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:45.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365646162333239643862323838656661376337366338366132383366 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4869 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:45.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365646162333239643862323838656661376337366338366132383366 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit: BPF prog-id=205 op=LOAD Dec 13 02:22:45.526000 audit[5386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000326710 items=0 ppid=4869 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:45.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365646162333239643862323838656661376337366338366132383366 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit: BPF prog-id=206 op=LOAD Dec 13 02:22:45.526000 audit[5386]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000326758 items=0 ppid=4869 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:45.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365646162333239643862323838656661376337366338366132383366 Dec 13 02:22:45.526000 audit: BPF prog-id=206 op=UNLOAD Dec 13 02:22:45.526000 audit: BPF prog-id=205 op=UNLOAD Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { perfmon } for pid=5386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit[5386]: AVC avc: denied { bpf } for pid=5386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:22:45.526000 audit: BPF prog-id=207 op=LOAD Dec 13 02:22:45.526000 audit[5386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000326b68 items=0 ppid=4869 pid=5386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:45.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365646162333239643862323838656661376337366338366132383366 Dec 13 02:22:45.660113 env[1740]: time="2024-12-13T02:22:45.660044806Z" level=info msg="StartContainer for \"3edab329d8b288efa7c76c86a283fd8fec2cc599087668f80612a10c80733bf3\" returns successfully" Dec 13 02:22:45.791270 kubelet[2815]: I1213 02:22:45.791189 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-dbfb5f45c-8kkfd" podStartSLOduration=31.169890445 podStartE2EDuration="41.791163106s" podCreationTimestamp="2024-12-13 02:22:04 +0000 UTC" firstStartedPulling="2024-12-13 02:22:34.447341961 +0000 UTC m=+52.749870378" lastFinishedPulling="2024-12-13 02:22:45.068614623 +0000 UTC m=+63.371143039" observedRunningTime="2024-12-13 02:22:45.643498953 +0000 UTC m=+63.946027378" watchObservedRunningTime="2024-12-13 02:22:45.791163106 +0000 UTC m=+64.093691524" Dec 13 02:22:46.114771 systemd[1]: run-containerd-runc-k8s.io-53ea0fe001543acdb8ce2bb668deefd85a2767de1d48f6f63ffdbe42446ce79c-runc.QTSBfl.mount: Deactivated successfully. Dec 13 02:22:46.692000 audit[5439]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:46.692000 audit[5439]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd029842f0 a2=0 a3=7ffd029842dc items=0 ppid=2987 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:46.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:46.699000 audit[5439]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:46.699000 audit[5439]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd029842f0 a2=0 a3=7ffd029842dc items=0 ppid=2987 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:46.699000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:46.928000 audit[5397]: AVC avc: denied { watch } for pid=5397 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_22_17.2137878063/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c744 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c462,c744 tclass=file permissive=0 Dec 13 02:22:46.928000 audit[5397]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00129dce0 a2=fc6 a3=0 items=0 ppid=4869 pid=5397 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c744 key=(null) Dec 13 02:22:46.928000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:22:46.958151 systemd[1]: Started sshd@9-172.31.18.8:22-139.178.68.195:38100.service. Dec 13 02:22:46.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.18.8:22-139.178.68.195:38100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:47.026988 kubelet[2815]: I1213 02:22:47.026888 2815 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7f96ff6ddd-dvjdm" podStartSLOduration=34.563294291 podStartE2EDuration="44.026857512s" podCreationTimestamp="2024-12-13 02:22:03 +0000 UTC" firstStartedPulling="2024-12-13 02:22:35.954311552 +0000 UTC m=+54.256839967" lastFinishedPulling="2024-12-13 02:22:45.417874781 +0000 UTC m=+63.720403188" observedRunningTime="2024-12-13 02:22:46.650710235 +0000 UTC m=+64.953238660" watchObservedRunningTime="2024-12-13 02:22:47.026857512 +0000 UTC m=+65.329385938" Dec 13 02:22:47.127000 audit[5444]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=5444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:47.127000 audit[5444]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb630b1b0 a2=0 a3=7ffdb630b19c items=0 ppid=2987 pid=5444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:47.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:47.132000 audit[5444]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=5444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:22:47.132000 audit[5444]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdb630b1b0 a2=0 a3=7ffdb630b19c items=0 ppid=2987 pid=5444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:47.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:22:47.256254 sshd[5441]: Accepted publickey for core from 139.178.68.195 port 38100 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:47.254000 audit[5441]: USER_ACCT pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:47.257000 audit[5441]: CRED_ACQ pid=5441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:47.258000 audit[5441]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd69fe90 a2=3 a3=0 items=0 ppid=1 pid=5441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:47.258000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:22:47.265366 sshd[5441]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:47.280471 systemd-logind[1734]: New session 10 of user core. Dec 13 02:22:47.286129 systemd[1]: Started session-10.scope. Dec 13 02:22:47.293000 audit[5441]: USER_START pid=5441 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:47.305000 audit[5451]: CRED_ACQ pid=5451 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:47.342616 systemd[1]: run-containerd-runc-k8s.io-53ea0fe001543acdb8ce2bb668deefd85a2767de1d48f6f63ffdbe42446ce79c-runc.Cyyt1o.mount: Deactivated successfully. Dec 13 02:22:47.930540 sshd[5441]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:47.932000 audit[5441]: USER_END pid=5441 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:47.932000 audit[5441]: CRED_DISP pid=5441 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:47.935607 systemd[1]: sshd@9-172.31.18.8:22-139.178.68.195:38100.service: Deactivated successfully. Dec 13 02:22:47.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.18.8:22-139.178.68.195:38100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:47.938736 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:22:47.940197 systemd-logind[1734]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:22:47.941541 systemd-logind[1734]: Removed session 10. Dec 13 02:22:47.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.18.8:22-139.178.68.195:38108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:47.960320 systemd[1]: Started sshd@10-172.31.18.8:22-139.178.68.195:38108.service. Dec 13 02:22:48.144000 audit[5474]: USER_ACCT pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:48.146298 sshd[5474]: Accepted publickey for core from 139.178.68.195 port 38108 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:48.146000 audit[5474]: CRED_ACQ pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:48.146000 audit[5474]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1b634550 a2=3 a3=0 items=0 ppid=1 pid=5474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:48.146000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:22:48.149346 sshd[5474]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:48.162195 systemd[1]: Started session-11.scope. Dec 13 02:22:48.164443 systemd-logind[1734]: New session 11 of user core. Dec 13 02:22:48.174000 audit[5474]: USER_START pid=5474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:48.176000 audit[5476]: CRED_ACQ pid=5476 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:48.534325 sshd[5474]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:48.534000 audit[5474]: USER_END pid=5474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:48.534000 audit[5474]: CRED_DISP pid=5474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:48.538547 systemd-logind[1734]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:22:48.539035 systemd[1]: sshd@10-172.31.18.8:22-139.178.68.195:38108.service: Deactivated successfully. Dec 13 02:22:48.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.18.8:22-139.178.68.195:38108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:48.540341 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:22:48.543748 systemd-logind[1734]: Removed session 11. Dec 13 02:22:48.585183 systemd[1]: Started sshd@11-172.31.18.8:22-139.178.68.195:38110.service. Dec 13 02:22:48.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.18.8:22-139.178.68.195:38110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:48.781402 sshd[5484]: Accepted publickey for core from 139.178.68.195 port 38110 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:48.779000 audit[5484]: USER_ACCT pid=5484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:48.787000 audit[5484]: CRED_ACQ pid=5484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:48.788000 audit[5484]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc23d18100 a2=3 a3=0 items=0 ppid=1 pid=5484 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:48.788000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:22:48.801932 sshd[5484]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:48.833927 systemd-logind[1734]: New session 12 of user core. Dec 13 02:22:48.834642 systemd[1]: Started session-12.scope. Dec 13 02:22:48.858000 audit[5484]: USER_START pid=5484 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:48.859000 audit[5486]: CRED_ACQ pid=5486 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:49.135460 sshd[5484]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:49.136000 audit[5484]: USER_END pid=5484 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:49.137000 audit[5484]: CRED_DISP pid=5484 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:49.141738 systemd[1]: sshd@11-172.31.18.8:22-139.178.68.195:38110.service: Deactivated successfully. Dec 13 02:22:49.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.18.8:22-139.178.68.195:38110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:49.142772 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:22:49.144180 systemd-logind[1734]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:22:49.145343 systemd-logind[1734]: Removed session 12. Dec 13 02:22:54.169293 systemd[1]: Started sshd@12-172.31.18.8:22-139.178.68.195:38120.service. Dec 13 02:22:54.177561 kernel: kauditd_printk_skb: 152 callbacks suppressed Dec 13 02:22:54.177725 kernel: audit: type=1130 audit(1734056574.170:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.18.8:22-139.178.68.195:38120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:54.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.18.8:22-139.178.68.195:38120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:54.384000 audit[5505]: USER_ACCT pid=5505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.395813 kernel: audit: type=1101 audit(1734056574.384:1390): pid=5505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.395936 kernel: audit: type=1103 audit(1734056574.389:1391): pid=5505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.396121 kernel: audit: type=1006 audit(1734056574.389:1392): pid=5505 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 02:22:54.389000 audit[5505]: CRED_ACQ pid=5505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.396327 sshd[5505]: Accepted publickey for core from 139.178.68.195 port 38120 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:22:54.389000 audit[5505]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5f4eeb70 a2=3 a3=0 items=0 ppid=1 pid=5505 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:54.402303 sshd[5505]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:22:54.404306 kernel: audit: type=1300 audit(1734056574.389:1392): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5f4eeb70 a2=3 a3=0 items=0 ppid=1 pid=5505 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:22:54.389000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:22:54.406298 kernel: audit: type=1327 audit(1734056574.389:1392): proctitle=737368643A20636F7265205B707269765D Dec 13 02:22:54.417050 systemd-logind[1734]: New session 13 of user core. Dec 13 02:22:54.418549 systemd[1]: Started session-13.scope. Dec 13 02:22:54.427000 audit[5505]: USER_START pid=5505 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.435166 kernel: audit: type=1105 audit(1734056574.427:1393): pid=5505 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.435735 kernel: audit: type=1103 audit(1734056574.432:1394): pid=5507 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.432000 audit[5507]: CRED_ACQ pid=5507 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.890761 sshd[5505]: pam_unix(sshd:session): session closed for user core Dec 13 02:22:54.894000 audit[5505]: USER_END pid=5505 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.897289 systemd[1]: sshd@12-172.31.18.8:22-139.178.68.195:38120.service: Deactivated successfully. Dec 13 02:22:54.894000 audit[5505]: CRED_DISP pid=5505 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.898564 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:22:54.901754 systemd-logind[1734]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:22:54.903565 systemd-logind[1734]: Removed session 13. Dec 13 02:22:54.905120 kernel: audit: type=1106 audit(1734056574.894:1395): pid=5505 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.905219 kernel: audit: type=1104 audit(1734056574.894:1396): pid=5505 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:22:54.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.18.8:22-139.178.68.195:38120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:59.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.18.8:22-139.178.68.195:50924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:22:59.918475 systemd[1]: Started sshd@13-172.31.18.8:22-139.178.68.195:50924.service. Dec 13 02:22:59.920387 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:22:59.920433 kernel: audit: type=1130 audit(1734056579.918:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.18.8:22-139.178.68.195:50924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:00.162000 audit[5525]: USER_ACCT pid=5525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.165706 sshd[5525]: Accepted publickey for core from 139.178.68.195 port 50924 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:00.171878 kernel: audit: type=1101 audit(1734056580.162:1399): pid=5525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.170000 audit[5525]: CRED_ACQ pid=5525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.173414 sshd[5525]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:00.180134 kernel: audit: type=1103 audit(1734056580.170:1400): pid=5525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.180272 kernel: audit: type=1006 audit(1734056580.170:1401): pid=5525 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 02:23:00.170000 audit[5525]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14e59c30 a2=3 a3=0 items=0 ppid=1 pid=5525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:00.188762 kernel: audit: type=1300 audit(1734056580.170:1401): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14e59c30 a2=3 a3=0 items=0 ppid=1 pid=5525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:00.188990 kernel: audit: type=1327 audit(1734056580.170:1401): proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:00.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:00.191538 systemd[1]: Started session-14.scope. Dec 13 02:23:00.192460 systemd-logind[1734]: New session 14 of user core. Dec 13 02:23:00.205000 audit[5525]: USER_START pid=5525 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.210000 audit[5527]: CRED_ACQ pid=5527 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.216601 kernel: audit: type=1105 audit(1734056580.205:1402): pid=5525 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.216737 kernel: audit: type=1103 audit(1734056580.210:1403): pid=5527 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.496433 sshd[5525]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:00.501000 audit[5525]: USER_END pid=5525 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.510187 kernel: audit: type=1106 audit(1734056580.501:1404): pid=5525 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.510338 kernel: audit: type=1104 audit(1734056580.501:1405): pid=5525 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.501000 audit[5525]: CRED_DISP pid=5525 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:00.507361 systemd[1]: sshd@13-172.31.18.8:22-139.178.68.195:50924.service: Deactivated successfully. Dec 13 02:23:00.509150 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:23:00.525806 systemd-logind[1734]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:23:00.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.18.8:22-139.178.68.195:50924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:00.540214 systemd-logind[1734]: Removed session 14. Dec 13 02:23:03.635979 systemd[1]: run-containerd-runc-k8s.io-53ea0fe001543acdb8ce2bb668deefd85a2767de1d48f6f63ffdbe42446ce79c-runc.dUhdND.mount: Deactivated successfully. Dec 13 02:23:05.528352 systemd[1]: Started sshd@14-172.31.18.8:22-139.178.68.195:50932.service. Dec 13 02:23:05.537484 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:23:05.537633 kernel: audit: type=1130 audit(1734056585.531:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.18.8:22-139.178.68.195:50932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:05.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.18.8:22-139.178.68.195:50932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:05.784000 audit[5559]: USER_ACCT pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:05.787188 sshd[5559]: Accepted publickey for core from 139.178.68.195 port 50932 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:05.789000 audit[5559]: CRED_ACQ pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:05.802940 kernel: audit: type=1101 audit(1734056585.784:1408): pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:05.803139 kernel: audit: type=1103 audit(1734056585.789:1409): pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:05.803200 kernel: audit: type=1006 audit(1734056585.789:1410): pid=5559 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 02:23:05.789000 audit[5559]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfd5f7430 a2=3 a3=0 items=0 ppid=1 pid=5559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:05.814946 sshd[5559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:05.824128 kernel: audit: type=1300 audit(1734056585.789:1410): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfd5f7430 a2=3 a3=0 items=0 ppid=1 pid=5559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:05.831259 kernel: audit: type=1327 audit(1734056585.789:1410): proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:05.789000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:05.847778 systemd-logind[1734]: New session 15 of user core. Dec 13 02:23:05.852529 systemd[1]: Started session-15.scope. Dec 13 02:23:05.861000 audit[5559]: USER_START pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:05.861000 audit[5561]: CRED_ACQ pid=5561 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:05.873299 kernel: audit: type=1105 audit(1734056585.861:1411): pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:05.873486 kernel: audit: type=1103 audit(1734056585.861:1412): pid=5561 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:06.397372 sshd[5559]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:06.403000 audit[5559]: USER_END pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:06.412855 kernel: audit: type=1106 audit(1734056586.403:1413): pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:06.412000 audit[5559]: CRED_DISP pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:06.417859 kernel: audit: type=1104 audit(1734056586.412:1414): pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:06.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.18.8:22-139.178.68.195:50932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:06.420789 systemd[1]: sshd@14-172.31.18.8:22-139.178.68.195:50932.service: Deactivated successfully. Dec 13 02:23:06.422036 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:23:06.424565 systemd-logind[1734]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:23:06.425916 systemd-logind[1734]: Removed session 15. Dec 13 02:23:11.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.8:22-139.178.68.195:36428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:11.422213 systemd[1]: Started sshd@15-172.31.18.8:22-139.178.68.195:36428.service. Dec 13 02:23:11.423430 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:23:11.423502 kernel: audit: type=1130 audit(1734056591.421:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.8:22-139.178.68.195:36428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:11.611000 audit[5577]: USER_ACCT pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.612724 sshd[5577]: Accepted publickey for core from 139.178.68.195 port 36428 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:11.616000 audit[5577]: CRED_ACQ pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.618249 sshd[5577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:11.621981 kernel: audit: type=1101 audit(1734056591.611:1417): pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.622105 kernel: audit: type=1103 audit(1734056591.616:1418): pid=5577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.626667 kernel: audit: type=1006 audit(1734056591.616:1419): pid=5577 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 02:23:11.626793 kernel: audit: type=1300 audit(1734056591.616:1419): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb38a4b20 a2=3 a3=0 items=0 ppid=1 pid=5577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:11.616000 audit[5577]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb38a4b20 a2=3 a3=0 items=0 ppid=1 pid=5577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:11.626239 systemd[1]: Started session-16.scope. Dec 13 02:23:11.628615 systemd-logind[1734]: New session 16 of user core. Dec 13 02:23:11.616000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:11.632362 kernel: audit: type=1327 audit(1734056591.616:1419): proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:11.635000 audit[5577]: USER_START pid=5577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.643875 kernel: audit: type=1105 audit(1734056591.635:1420): pid=5577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.644011 kernel: audit: type=1103 audit(1734056591.635:1421): pid=5579 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.635000 audit[5579]: CRED_ACQ pid=5579 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.852879 sshd[5577]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:11.855000 audit[5577]: USER_END pid=5577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.856000 audit[5577]: CRED_DISP pid=5577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.865499 kernel: audit: type=1106 audit(1734056591.855:1422): pid=5577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.865635 kernel: audit: type=1104 audit(1734056591.856:1423): pid=5577 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:11.865929 systemd[1]: sshd@15-172.31.18.8:22-139.178.68.195:36428.service: Deactivated successfully. Dec 13 02:23:11.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.8:22-139.178.68.195:36428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:11.867082 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:23:11.867929 systemd-logind[1734]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:23:11.869086 systemd-logind[1734]: Removed session 16. Dec 13 02:23:11.876032 systemd[1]: Started sshd@16-172.31.18.8:22-139.178.68.195:36432.service. Dec 13 02:23:11.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.18.8:22-139.178.68.195:36432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:12.037000 audit[5589]: USER_ACCT pid=5589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:12.039410 sshd[5589]: Accepted publickey for core from 139.178.68.195 port 36432 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:12.043000 audit[5589]: CRED_ACQ pid=5589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:12.044000 audit[5589]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaf347950 a2=3 a3=0 items=0 ppid=1 pid=5589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:12.044000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:12.045539 sshd[5589]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:12.066844 systemd[1]: Started session-17.scope. Dec 13 02:23:12.067662 systemd-logind[1734]: New session 17 of user core. Dec 13 02:23:12.096000 audit[5589]: USER_START pid=5589 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:12.101000 audit[5591]: CRED_ACQ pid=5591 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:12.997931 sshd[5589]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:12.998000 audit[5589]: USER_END pid=5589 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:12.998000 audit[5589]: CRED_DISP pid=5589 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:13.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.18.8:22-139.178.68.195:36432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:13.007466 systemd-logind[1734]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:23:13.007717 systemd[1]: sshd@16-172.31.18.8:22-139.178.68.195:36432.service: Deactivated successfully. Dec 13 02:23:13.008745 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:23:13.009801 systemd-logind[1734]: Removed session 17. Dec 13 02:23:13.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.8:22-139.178.68.195:36440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:13.023503 systemd[1]: Started sshd@17-172.31.18.8:22-139.178.68.195:36440.service. Dec 13 02:23:13.265000 audit[5622]: USER_ACCT pid=5622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:13.267795 sshd[5622]: Accepted publickey for core from 139.178.68.195 port 36440 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:13.267000 audit[5622]: CRED_ACQ pid=5622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:13.267000 audit[5622]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9b33e690 a2=3 a3=0 items=0 ppid=1 pid=5622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:13.267000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:13.271921 sshd[5622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:13.291909 systemd[1]: Started session-18.scope. Dec 13 02:23:13.293141 systemd-logind[1734]: New session 18 of user core. Dec 13 02:23:13.311000 audit[5622]: USER_START pid=5622 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:13.319000 audit[5624]: CRED_ACQ pid=5624 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:16.825949 kubelet[2815]: I1213 02:23:16.825889 2815 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:23:16.900645 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 02:23:16.901340 kernel: audit: type=1325 audit(1734056596.888:1440): table=filter:121 family=2 entries=20 op=nft_register_rule pid=5641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.888000 audit[5641]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.915154 kernel: audit: type=1300 audit(1734056596.888:1440): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffb0da5640 a2=0 a3=7fffb0da562c items=0 ppid=2987 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.916315 kernel: audit: type=1327 audit(1734056596.888:1440): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:16.888000 audit[5641]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffb0da5640 a2=0 a3=7fffb0da562c items=0 ppid=2987 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:16.911864 sshd[5622]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:16.928738 kernel: audit: type=1106 audit(1734056596.919:1441): pid=5622 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:16.919000 audit[5622]: USER_END pid=5622 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:16.925342 systemd[1]: sshd@17-172.31.18.8:22-139.178.68.195:36440.service: Deactivated successfully. Dec 13 02:23:16.936228 kernel: audit: type=1104 audit(1734056596.920:1442): pid=5622 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:16.937478 kernel: audit: type=1131 audit(1734056596.920:1443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.8:22-139.178.68.195:36440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:16.920000 audit[5622]: CRED_DISP pid=5622 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:16.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.8:22-139.178.68.195:36440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:16.926451 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:23:16.941166 systemd[1]: Started sshd@18-172.31.18.8:22-139.178.68.195:40816.service. Dec 13 02:23:16.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.18.8:22-139.178.68.195:40816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:16.948074 systemd-logind[1734]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:23:16.950502 systemd-logind[1734]: Removed session 18. Dec 13 02:23:16.952981 kernel: audit: type=1130 audit(1734056596.940:1444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.18.8:22-139.178.68.195:40816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:16.945000 audit[5641]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.962866 kernel: audit: type=1325 audit(1734056596.945:1445): table=nat:122 family=2 entries=22 op=nft_register_rule pid=5641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:16.945000 audit[5641]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffb0da5640 a2=0 a3=0 items=0 ppid=2987 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.975853 kernel: audit: type=1300 audit(1734056596.945:1445): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffb0da5640 a2=0 a3=0 items=0 ppid=2987 pid=5641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:16.945000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:16.981857 kernel: audit: type=1327 audit(1734056596.945:1445): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:17.025000 audit[5647]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:17.025000 audit[5647]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc582837d0 a2=0 a3=7ffc582837bc items=0 ppid=2987 pid=5647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:17.041000 audit[5647]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5647 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:17.041000 audit[5647]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc582837d0 a2=0 a3=0 items=0 ppid=2987 pid=5647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:17.146000 audit[5644]: USER_ACCT pid=5644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:17.147984 sshd[5644]: Accepted publickey for core from 139.178.68.195 port 40816 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:17.148000 audit[5644]: CRED_ACQ pid=5644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:17.148000 audit[5644]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd447e4ae0 a2=3 a3=0 items=0 ppid=1 pid=5644 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:17.148000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:17.150012 sshd[5644]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:17.160173 systemd[1]: Started session-19.scope. Dec 13 02:23:17.169554 systemd-logind[1734]: New session 19 of user core. Dec 13 02:23:17.187000 audit[5644]: USER_START pid=5644 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:17.193000 audit[5648]: CRED_ACQ pid=5648 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:18.082000 audit[5673]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=5673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:18.082000 audit[5673]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff5ede80e0 a2=0 a3=7fff5ede80cc items=0 ppid=2987 pid=5673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:18.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:18.088000 audit[5673]: NETFILTER_CFG table=nat:126 family=2 entries=34 op=nft_register_chain pid=5673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:18.088000 audit[5673]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff5ede80e0 a2=0 a3=7fff5ede80cc items=0 ppid=2987 pid=5673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:18.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:18.271243 sshd[5644]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:18.271000 audit[5644]: USER_END pid=5644 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:18.272000 audit[5644]: CRED_DISP pid=5644 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:18.275559 systemd-logind[1734]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:23:18.276002 systemd[1]: sshd@18-172.31.18.8:22-139.178.68.195:40816.service: Deactivated successfully. Dec 13 02:23:18.277394 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:23:18.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.18.8:22-139.178.68.195:40816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:18.279288 systemd-logind[1734]: Removed session 19. Dec 13 02:23:18.299276 systemd[1]: Started sshd@19-172.31.18.8:22-139.178.68.195:40832.service. Dec 13 02:23:18.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.18.8:22-139.178.68.195:40832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:18.502000 audit[5676]: USER_ACCT pid=5676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:18.503403 sshd[5676]: Accepted publickey for core from 139.178.68.195 port 40832 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:18.504000 audit[5676]: CRED_ACQ pid=5676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:18.504000 audit[5676]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd012c26c0 a2=3 a3=0 items=0 ppid=1 pid=5676 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:18.504000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:18.510903 sshd[5676]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:18.518719 systemd[1]: Started session-20.scope. Dec 13 02:23:18.519496 systemd-logind[1734]: New session 20 of user core. Dec 13 02:23:18.525000 audit[5676]: USER_START pid=5676 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:18.527000 audit[5678]: CRED_ACQ pid=5678 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:18.756676 sshd[5676]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:18.758000 audit[5676]: USER_END pid=5676 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:18.759000 audit[5676]: CRED_DISP pid=5676 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:18.762262 systemd-logind[1734]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:23:18.762815 systemd[1]: sshd@19-172.31.18.8:22-139.178.68.195:40832.service: Deactivated successfully. Dec 13 02:23:18.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.18.8:22-139.178.68.195:40832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:18.764033 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:23:18.765054 systemd-logind[1734]: Removed session 20. Dec 13 02:23:23.801721 kernel: kauditd_printk_skb: 33 callbacks suppressed Dec 13 02:23:23.802017 kernel: audit: type=1130 audit(1734056603.794:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.18.8:22-139.178.68.195:40834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:23.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.18.8:22-139.178.68.195:40834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:23.794760 systemd[1]: Started sshd@20-172.31.18.8:22-139.178.68.195:40834.service. Dec 13 02:23:23.945000 audit[5690]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:23.945000 audit[5690]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcf34afb80 a2=0 a3=7ffcf34afb6c items=0 ppid=2987 pid=5690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.949975 kernel: audit: type=1325 audit(1734056603.945:1468): table=filter:127 family=2 entries=20 op=nft_register_rule pid=5690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:23.950022 kernel: audit: type=1300 audit(1734056603.945:1468): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcf34afb80 a2=0 a3=7ffcf34afb6c items=0 ppid=2987 pid=5690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.945000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:23.957856 kernel: audit: type=1327 audit(1734056603.945:1468): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:23.958000 audit[5690]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:23.958000 audit[5690]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcf34afb80 a2=0 a3=7ffcf34afb6c items=0 ppid=2987 pid=5690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.968644 kernel: audit: type=1325 audit(1734056603.958:1469): table=nat:128 family=2 entries=106 op=nft_register_chain pid=5690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:23:23.968772 kernel: audit: type=1300 audit(1734056603.958:1469): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcf34afb80 a2=0 a3=7ffcf34afb6c items=0 ppid=2987 pid=5690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:23.958000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:23.972863 kernel: audit: type=1327 audit(1734056603.958:1469): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:23:24.041700 sshd[5687]: Accepted publickey for core from 139.178.68.195 port 40834 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:24.040000 audit[5687]: USER_ACCT pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:24.047854 kernel: audit: type=1101 audit(1734056604.040:1470): pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:24.047000 audit[5687]: CRED_ACQ pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:24.048929 sshd[5687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:24.053860 kernel: audit: type=1103 audit(1734056604.047:1471): pid=5687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:24.047000 audit[5687]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7f1524c0 a2=3 a3=0 items=0 ppid=1 pid=5687 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:24.060070 kernel: audit: type=1006 audit(1734056604.047:1472): pid=5687 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 02:23:24.047000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:24.067405 systemd-logind[1734]: New session 21 of user core. Dec 13 02:23:24.070034 systemd[1]: Started session-21.scope. Dec 13 02:23:24.087000 audit[5687]: USER_START pid=5687 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:24.089000 audit[5692]: CRED_ACQ pid=5692 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:24.432052 sshd[5687]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:24.433000 audit[5687]: USER_END pid=5687 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:24.433000 audit[5687]: CRED_DISP pid=5687 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:24.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.18.8:22-139.178.68.195:40834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:24.437300 systemd[1]: sshd@20-172.31.18.8:22-139.178.68.195:40834.service: Deactivated successfully. Dec 13 02:23:24.438378 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:23:24.440076 systemd-logind[1734]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:23:24.443062 systemd-logind[1734]: Removed session 21. Dec 13 02:23:29.458777 systemd[1]: Started sshd@21-172.31.18.8:22-139.178.68.195:43750.service. Dec 13 02:23:29.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.18.8:22-139.178.68.195:43750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:29.468570 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 02:23:29.468687 kernel: audit: type=1130 audit(1734056609.465:1478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.18.8:22-139.178.68.195:43750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:29.642392 sshd[5704]: Accepted publickey for core from 139.178.68.195 port 43750 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:29.641000 audit[5704]: USER_ACCT pid=5704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.651113 kernel: audit: type=1101 audit(1734056609.641:1479): pid=5704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.649000 audit[5704]: CRED_ACQ pid=5704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.658860 kernel: audit: type=1103 audit(1734056609.649:1480): pid=5704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.658929 sshd[5704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:29.650000 audit[5704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8311def0 a2=3 a3=0 items=0 ppid=1 pid=5704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:29.669098 kernel: audit: type=1006 audit(1734056609.650:1481): pid=5704 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 02:23:29.669323 kernel: audit: type=1300 audit(1734056609.650:1481): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8311def0 a2=3 a3=0 items=0 ppid=1 pid=5704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:29.650000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:29.678570 kernel: audit: type=1327 audit(1734056609.650:1481): proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:29.677574 systemd-logind[1734]: New session 22 of user core. Dec 13 02:23:29.680043 systemd[1]: Started session-22.scope. Dec 13 02:23:29.694000 audit[5704]: USER_START pid=5704 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.701865 kernel: audit: type=1105 audit(1734056609.694:1482): pid=5704 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.705000 audit[5706]: CRED_ACQ pid=5706 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.712874 kernel: audit: type=1103 audit(1734056609.705:1483): pid=5706 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.975337 sshd[5704]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:29.976000 audit[5704]: USER_END pid=5704 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.981402 systemd[1]: sshd@21-172.31.18.8:22-139.178.68.195:43750.service: Deactivated successfully. Dec 13 02:23:29.982512 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:23:29.976000 audit[5704]: CRED_DISP pid=5704 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.987783 kernel: audit: type=1106 audit(1734056609.976:1484): pid=5704 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.987995 kernel: audit: type=1104 audit(1734056609.976:1485): pid=5704 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:29.987858 systemd-logind[1734]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:23:29.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.18.8:22-139.178.68.195:43750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:29.989551 systemd-logind[1734]: Removed session 22. Dec 13 02:23:35.001206 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:23:35.001354 kernel: audit: type=1130 audit(1734056614.999:1487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.18.8:22-139.178.68.195:43760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:34.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.18.8:22-139.178.68.195:43760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:35.000004 systemd[1]: Started sshd@22-172.31.18.8:22-139.178.68.195:43760.service. Dec 13 02:23:35.164000 audit[5715]: USER_ACCT pid=5715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.172341 sshd[5715]: Accepted publickey for core from 139.178.68.195 port 43760 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:35.171000 audit[5715]: CRED_ACQ pid=5715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.172708 sshd[5715]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:35.177775 kernel: audit: type=1101 audit(1734056615.164:1488): pid=5715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.177936 kernel: audit: type=1103 audit(1734056615.171:1489): pid=5715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.177975 kernel: audit: type=1006 audit(1734056615.171:1490): pid=5715 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 02:23:35.180268 kernel: audit: type=1300 audit(1734056615.171:1490): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2062fb90 a2=3 a3=0 items=0 ppid=1 pid=5715 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:35.171000 audit[5715]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2062fb90 a2=3 a3=0 items=0 ppid=1 pid=5715 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:35.179737 systemd[1]: Started session-23.scope. Dec 13 02:23:35.182001 systemd-logind[1734]: New session 23 of user core. Dec 13 02:23:35.171000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:35.186945 kernel: audit: type=1327 audit(1734056615.171:1490): proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:35.187000 audit[5715]: USER_START pid=5715 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.189000 audit[5717]: CRED_ACQ pid=5717 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.197057 kernel: audit: type=1105 audit(1734056615.187:1491): pid=5715 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.197149 kernel: audit: type=1103 audit(1734056615.189:1492): pid=5717 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.377453 sshd[5715]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:35.384877 kernel: audit: type=1106 audit(1734056615.379:1493): pid=5715 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.379000 audit[5715]: USER_END pid=5715 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.385226 systemd[1]: sshd@22-172.31.18.8:22-139.178.68.195:43760.service: Deactivated successfully. Dec 13 02:23:35.390365 kernel: audit: type=1104 audit(1734056615.379:1494): pid=5715 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.379000 audit[5715]: CRED_DISP pid=5715 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:35.386492 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:23:35.389753 systemd-logind[1734]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:23:35.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.18.8:22-139.178.68.195:43760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:35.391272 systemd-logind[1734]: Removed session 23. Dec 13 02:23:35.538000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:35.538000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:35.538000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a9f770 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:23:35.538000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001171760 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:23:35.538000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:23:35.538000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:23:36.673000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:36.673000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:36.673000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00fb2bf50 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:23:36.673000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:23:36.673000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c01017e8a0 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:23:36.673000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:23:36.676000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:36.676000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00fb2bf80 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:23:36.676000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:23:36.677000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:36.677000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00f3be7e0 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:23:36.677000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:23:36.676000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:36.676000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c01017e930 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:23:36.676000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:23:36.679000 audit[2581]: AVC avc: denied { watch } for pid=2581 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:36.679000 audit[2581]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00f0a1640 a2=fc6 a3=0 items=0 ppid=2455 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c34,c178 key=(null) Dec 13 02:23:36.679000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E38002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 02:23:39.144000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:39.144000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:39.144000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ae2340 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:23:39.144000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:23:39.144000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d3c960 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:23:39.144000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:23:39.156000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:39.156000 audit[2541]: AVC avc: denied { watch } for pid=2541 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:23:39.156000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d3ccc0 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:23:39.156000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:23:39.156000 audit[2541]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ae24e0 a2=fc6 a3=0 items=0 ppid=2409 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:23:39.156000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:23:40.422504 systemd[1]: Started sshd@23-172.31.18.8:22-139.178.68.195:37120.service. Dec 13 02:23:40.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.18.8:22-139.178.68.195:37120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:40.425336 kernel: kauditd_printk_skb: 37 callbacks suppressed Dec 13 02:23:40.425418 kernel: audit: type=1130 audit(1734056620.422:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.18.8:22-139.178.68.195:37120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:40.605000 audit[5728]: USER_ACCT pid=5728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.612510 sshd[5728]: Accepted publickey for core from 139.178.68.195 port 37120 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:40.614431 kernel: audit: type=1101 audit(1734056620.605:1509): pid=5728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.614482 kernel: audit: type=1103 audit(1734056620.612:1510): pid=5728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.612000 audit[5728]: CRED_ACQ pid=5728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.613926 sshd[5728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:40.612000 audit[5728]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe94d83850 a2=3 a3=0 items=0 ppid=1 pid=5728 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:40.634773 systemd[1]: Started session-24.scope. Dec 13 02:23:40.637245 kernel: audit: type=1006 audit(1734056620.612:1511): pid=5728 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 02:23:40.637382 kernel: audit: type=1300 audit(1734056620.612:1511): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe94d83850 a2=3 a3=0 items=0 ppid=1 pid=5728 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:40.640871 kernel: audit: type=1327 audit(1734056620.612:1511): proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:40.612000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:40.640508 systemd-logind[1734]: New session 24 of user core. Dec 13 02:23:40.650000 audit[5728]: USER_START pid=5728 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.662897 kernel: audit: type=1105 audit(1734056620.650:1512): pid=5728 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.664466 kernel: audit: type=1103 audit(1734056620.662:1513): pid=5730 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.662000 audit[5730]: CRED_ACQ pid=5730 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.894001 sshd[5728]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:40.895000 audit[5728]: USER_END pid=5728 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.899485 systemd-logind[1734]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:23:40.895000 audit[5728]: CRED_DISP pid=5728 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.901555 systemd[1]: sshd@23-172.31.18.8:22-139.178.68.195:37120.service: Deactivated successfully. Dec 13 02:23:40.902966 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:23:40.905572 systemd-logind[1734]: Removed session 24. Dec 13 02:23:40.907150 kernel: audit: type=1106 audit(1734056620.895:1514): pid=5728 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.907255 kernel: audit: type=1104 audit(1734056620.895:1515): pid=5728 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:40.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.18.8:22-139.178.68.195:37120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:42.499000 audit[4977]: AVC avc: denied { watch } for pid=4977 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_22_17.3007668750/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c245,c696 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c245,c696 tclass=file permissive=0 Dec 13 02:23:42.499000 audit[4977]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002180c80 a2=fc6 a3=0 items=0 ppid=4523 pid=4977 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c245,c696 key=(null) Dec 13 02:23:42.499000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:23:45.924351 systemd[1]: Started sshd@24-172.31.18.8:22-139.178.68.195:37124.service. Dec 13 02:23:45.935235 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 02:23:45.935447 kernel: audit: type=1130 audit(1734056625.924:1518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.18.8:22-139.178.68.195:37124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:45.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.18.8:22-139.178.68.195:37124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:46.136000 audit[5763]: USER_ACCT pid=5763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.139479 sshd[5763]: Accepted publickey for core from 139.178.68.195 port 37124 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:46.143653 kernel: audit: type=1101 audit(1734056626.136:1519): pid=5763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.144000 audit[5763]: CRED_ACQ pid=5763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.154069 sshd[5763]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:46.164551 kernel: audit: type=1103 audit(1734056626.144:1520): pid=5763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.164718 kernel: audit: type=1006 audit(1734056626.144:1521): pid=5763 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:23:46.181494 kernel: audit: type=1300 audit(1734056626.144:1521): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedb645f60 a2=3 a3=0 items=0 ppid=1 pid=5763 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:46.144000 audit[5763]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedb645f60 a2=3 a3=0 items=0 ppid=1 pid=5763 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:46.144000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:46.193122 kernel: audit: type=1327 audit(1734056626.144:1521): proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:46.203415 systemd-logind[1734]: New session 25 of user core. Dec 13 02:23:46.204750 systemd[1]: Started session-25.scope. Dec 13 02:23:46.211000 audit[5763]: USER_START pid=5763 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.215000 audit[5765]: CRED_ACQ pid=5765 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.221873 kernel: audit: type=1105 audit(1734056626.211:1522): pid=5763 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.226143 kernel: audit: type=1103 audit(1734056626.215:1523): pid=5765 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.433433 sshd[5763]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:46.434000 audit[5763]: USER_END pid=5763 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.434000 audit[5763]: CRED_DISP pid=5763 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.445642 systemd[1]: sshd@24-172.31.18.8:22-139.178.68.195:37124.service: Deactivated successfully. Dec 13 02:23:46.447868 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:23:46.448749 kernel: audit: type=1106 audit(1734056626.434:1524): pid=5763 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.448817 kernel: audit: type=1104 audit(1734056626.434:1525): pid=5763 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:46.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.18.8:22-139.178.68.195:37124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:46.449893 systemd-logind[1734]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:23:46.451212 systemd-logind[1734]: Removed session 25. Dec 13 02:23:46.930000 audit[5397]: AVC avc: denied { watch } for pid=5397 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_22_17.2137878063/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c744 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c462,c744 tclass=file permissive=0 Dec 13 02:23:46.930000 audit[5397]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00115c760 a2=fc6 a3=0 items=0 ppid=4869 pid=5397 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c744 key=(null) Dec 13 02:23:46.930000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:23:51.465990 systemd[1]: Started sshd@25-172.31.18.8:22-139.178.68.195:36586.service. Dec 13 02:23:51.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.18.8:22-139.178.68.195:36586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:51.467736 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 02:23:51.467811 kernel: audit: type=1130 audit(1734056631.465:1528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.18.8:22-139.178.68.195:36586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:51.671958 kernel: audit: type=1101 audit(1734056631.648:1529): pid=5800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.672153 kernel: audit: type=1103 audit(1734056631.649:1530): pid=5800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.648000 audit[5800]: USER_ACCT pid=5800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.649000 audit[5800]: CRED_ACQ pid=5800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.651193 sshd[5800]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:23:51.672809 sshd[5800]: Accepted publickey for core from 139.178.68.195 port 36586 ssh2: RSA SHA256:4KbtXXAWDYYJteZbJp3ZMRrg6Zfz5h3Ah6Q/YaIH9xY Dec 13 02:23:51.679233 systemd[1]: Started session-26.scope. Dec 13 02:23:51.681371 systemd-logind[1734]: New session 26 of user core. Dec 13 02:23:51.696867 kernel: audit: type=1006 audit(1734056631.649:1531): pid=5800 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 02:23:51.649000 audit[5800]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0bdefe50 a2=3 a3=0 items=0 ppid=1 pid=5800 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:51.649000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:51.710468 kernel: audit: type=1300 audit(1734056631.649:1531): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0bdefe50 a2=3 a3=0 items=0 ppid=1 pid=5800 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:23:51.710593 kernel: audit: type=1327 audit(1734056631.649:1531): proctitle=737368643A20636F7265205B707269765D Dec 13 02:23:51.710625 kernel: audit: type=1105 audit(1734056631.699:1532): pid=5800 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.699000 audit[5800]: USER_START pid=5800 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.701000 audit[5802]: CRED_ACQ pid=5802 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.719885 kernel: audit: type=1103 audit(1734056631.701:1533): pid=5802 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.968193 sshd[5800]: pam_unix(sshd:session): session closed for user core Dec 13 02:23:51.968000 audit[5800]: USER_END pid=5800 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.976879 kernel: audit: type=1106 audit(1734056631.968:1534): pid=5800 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.977932 systemd-logind[1734]: Session 26 logged out. Waiting for processes to exit. Dec 13 02:23:51.979135 systemd[1]: sshd@25-172.31.18.8:22-139.178.68.195:36586.service: Deactivated successfully. Dec 13 02:23:51.980351 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 02:23:51.982540 systemd-logind[1734]: Removed session 26. Dec 13 02:23:51.968000 audit[5800]: CRED_DISP pid=5800 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:23:51.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.18.8:22-139.178.68.195:36586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:23:51.987855 kernel: audit: type=1104 audit(1734056631.968:1535): pid=5800 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 02:24:03.678654 systemd[1]: run-containerd-runc-k8s.io-53ea0fe001543acdb8ce2bb668deefd85a2767de1d48f6f63ffdbe42446ce79c-runc.vGiaPQ.mount: Deactivated successfully. Dec 13 02:24:07.304006 systemd[1]: cri-containerd-f4873c2916d1d315246c965155cfe9fd6f0995fdd516b95046aea8df03c0a129.scope: Deactivated successfully. Dec 13 02:24:07.304621 systemd[1]: cri-containerd-f4873c2916d1d315246c965155cfe9fd6f0995fdd516b95046aea8df03c0a129.scope: Consumed 4.574s CPU time. Dec 13 02:24:07.303000 audit: BPF prog-id=114 op=UNLOAD Dec 13 02:24:07.308507 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:24:07.308663 kernel: audit: type=1334 audit(1734056647.303:1537): prog-id=114 op=UNLOAD Dec 13 02:24:07.313129 kernel: audit: type=1334 audit(1734056647.309:1538): prog-id=117 op=UNLOAD Dec 13 02:24:07.309000 audit: BPF prog-id=117 op=UNLOAD Dec 13 02:24:07.376915 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f4873c2916d1d315246c965155cfe9fd6f0995fdd516b95046aea8df03c0a129-rootfs.mount: Deactivated successfully. Dec 13 02:24:07.380484 env[1740]: time="2024-12-13T02:24:07.380156971Z" level=info msg="shim disconnected" id=f4873c2916d1d315246c965155cfe9fd6f0995fdd516b95046aea8df03c0a129 Dec 13 02:24:07.380484 env[1740]: time="2024-12-13T02:24:07.380221080Z" level=warning msg="cleaning up after shim disconnected" id=f4873c2916d1d315246c965155cfe9fd6f0995fdd516b95046aea8df03c0a129 namespace=k8s.io Dec 13 02:24:07.380484 env[1740]: time="2024-12-13T02:24:07.380240298Z" level=info msg="cleaning up dead shim" Dec 13 02:24:07.394001 env[1740]: time="2024-12-13T02:24:07.393942706Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:24:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5860 runtime=io.containerd.runc.v2\n" Dec 13 02:24:07.585003 kubelet[2815]: I1213 02:24:07.584159 2815 scope.go:117] "RemoveContainer" containerID="f4873c2916d1d315246c965155cfe9fd6f0995fdd516b95046aea8df03c0a129" Dec 13 02:24:07.602929 env[1740]: time="2024-12-13T02:24:07.602876514Z" level=info msg="CreateContainer within sandbox \"dbe0fc939cb90ee330d68fd360bedb811957046b6642003b3964e3bd7d673465\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Dec 13 02:24:07.649253 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount10334012.mount: Deactivated successfully. Dec 13 02:24:07.662232 env[1740]: time="2024-12-13T02:24:07.662138439Z" level=info msg="CreateContainer within sandbox \"dbe0fc939cb90ee330d68fd360bedb811957046b6642003b3964e3bd7d673465\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"7b7b1e49ea166780eb36567ce9fdb8408bf9c116f32eb704c932f6ece80d1e31\"" Dec 13 02:24:07.676753 env[1740]: time="2024-12-13T02:24:07.675675268Z" level=info msg="StartContainer for \"7b7b1e49ea166780eb36567ce9fdb8408bf9c116f32eb704c932f6ece80d1e31\"" Dec 13 02:24:07.760552 systemd[1]: Started cri-containerd-7b7b1e49ea166780eb36567ce9fdb8408bf9c116f32eb704c932f6ece80d1e31.scope. Dec 13 02:24:07.770759 systemd[1]: cri-containerd-2f726aaf4148cfd5edfd96697a0b407beece927a1eb73bd1efd5deadae22ddca.scope: Deactivated successfully. Dec 13 02:24:07.771421 systemd[1]: cri-containerd-2f726aaf4148cfd5edfd96697a0b407beece927a1eb73bd1efd5deadae22ddca.scope: Consumed 3.773s CPU time. Dec 13 02:24:07.777402 kernel: audit: type=1334 audit(1734056647.773:1539): prog-id=73 op=UNLOAD Dec 13 02:24:07.777806 kernel: audit: type=1334 audit(1734056647.773:1540): prog-id=102 op=UNLOAD Dec 13 02:24:07.773000 audit: BPF prog-id=73 op=UNLOAD Dec 13 02:24:07.773000 audit: BPF prog-id=102 op=UNLOAD Dec 13 02:24:07.821866 env[1740]: time="2024-12-13T02:24:07.821780367Z" level=info msg="shim disconnected" id=2f726aaf4148cfd5edfd96697a0b407beece927a1eb73bd1efd5deadae22ddca Dec 13 02:24:07.822056 env[1740]: time="2024-12-13T02:24:07.821870760Z" level=warning msg="cleaning up after shim disconnected" id=2f726aaf4148cfd5edfd96697a0b407beece927a1eb73bd1efd5deadae22ddca namespace=k8s.io Dec 13 02:24:07.822056 env[1740]: time="2024-12-13T02:24:07.821885269Z" level=info msg="cleaning up dead shim" Dec 13 02:24:07.841244 env[1740]: time="2024-12-13T02:24:07.839391395Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:24:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5909 runtime=io.containerd.runc.v2\n" Dec 13 02:24:07.867633 kernel: audit: type=1400 audit(1734056647.854:1541): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.873543 kernel: audit: type=1400 audit(1734056647.854:1542): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.873801 kernel: audit: type=1400 audit(1734056647.854:1543): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.891631 kernel: audit: type=1400 audit(1734056647.854:1544): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.891909 kernel: audit: type=1400 audit(1734056647.854:1545): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.891971 kernel: audit: type=1400 audit(1734056647.854:1546): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.854000 audit: BPF prog-id=208 op=LOAD Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2941 pid=5880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:07.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762376231653439656131363637383065623336353637636539666462 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2941 pid=5880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:07.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762376231653439656131363637383065623336353637636539666462 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.855000 audit: BPF prog-id=209 op=LOAD Dec 13 02:24:07.855000 audit[5880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025210 items=0 ppid=2941 pid=5880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:07.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762376231653439656131363637383065623336353637636539666462 Dec 13 02:24:07.866000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.866000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.866000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.866000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.866000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.866000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.866000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.866000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.866000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.866000 audit: BPF prog-id=210 op=LOAD Dec 13 02:24:07.866000 audit[5880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025258 items=0 ppid=2941 pid=5880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:07.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762376231653439656131363637383065623336353637636539666462 Dec 13 02:24:07.872000 audit: BPF prog-id=210 op=UNLOAD Dec 13 02:24:07.872000 audit: BPF prog-id=209 op=UNLOAD Dec 13 02:24:07.872000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.872000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.872000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.872000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.872000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.872000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.872000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.872000 audit[5880]: AVC avc: denied { perfmon } for pid=5880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.872000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.872000 audit[5880]: AVC avc: denied { bpf } for pid=5880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:07.872000 audit: BPF prog-id=211 op=LOAD Dec 13 02:24:07.872000 audit[5880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025668 items=0 ppid=2941 pid=5880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:07.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762376231653439656131363637383065623336353637636539666462 Dec 13 02:24:07.923975 env[1740]: time="2024-12-13T02:24:07.923918950Z" level=info msg="StartContainer for \"7b7b1e49ea166780eb36567ce9fdb8408bf9c116f32eb704c932f6ece80d1e31\" returns successfully" Dec 13 02:24:08.379355 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2f726aaf4148cfd5edfd96697a0b407beece927a1eb73bd1efd5deadae22ddca-rootfs.mount: Deactivated successfully. Dec 13 02:24:08.601791 kubelet[2815]: I1213 02:24:08.601697 2815 scope.go:117] "RemoveContainer" containerID="2f726aaf4148cfd5edfd96697a0b407beece927a1eb73bd1efd5deadae22ddca" Dec 13 02:24:08.609361 env[1740]: time="2024-12-13T02:24:08.607300360Z" level=info msg="CreateContainer within sandbox \"ecf39f5417781f82e9b0e5529ba99050b1a8762ab5a144667f6238fd394e5956\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Dec 13 02:24:08.659540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3325284589.mount: Deactivated successfully. Dec 13 02:24:08.678353 env[1740]: time="2024-12-13T02:24:08.678298540Z" level=info msg="CreateContainer within sandbox \"ecf39f5417781f82e9b0e5529ba99050b1a8762ab5a144667f6238fd394e5956\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"250c7b318fc61150748d4c4052973b4119bd0e82f68ac03467ebf1a0fb06d500\"" Dec 13 02:24:08.679677 env[1740]: time="2024-12-13T02:24:08.679640167Z" level=info msg="StartContainer for \"250c7b318fc61150748d4c4052973b4119bd0e82f68ac03467ebf1a0fb06d500\"" Dec 13 02:24:08.695711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2125568061.mount: Deactivated successfully. Dec 13 02:24:08.714973 systemd[1]: Started cri-containerd-250c7b318fc61150748d4c4052973b4119bd0e82f68ac03467ebf1a0fb06d500.scope. Dec 13 02:24:08.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.738000 audit: BPF prog-id=212 op=LOAD Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2409 pid=5943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:08.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235306337623331386663363131353037343864346334303532393733 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2409 pid=5943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:08.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235306337623331386663363131353037343864346334303532393733 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit: BPF prog-id=213 op=LOAD Dec 13 02:24:08.739000 audit[5943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000350c10 items=0 ppid=2409 pid=5943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:08.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235306337623331386663363131353037343864346334303532393733 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit: BPF prog-id=214 op=LOAD Dec 13 02:24:08.739000 audit[5943]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000350c58 items=0 ppid=2409 pid=5943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:08.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235306337623331386663363131353037343864346334303532393733 Dec 13 02:24:08.739000 audit: BPF prog-id=214 op=UNLOAD Dec 13 02:24:08.739000 audit: BPF prog-id=213 op=UNLOAD Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { perfmon } for pid=5943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit[5943]: AVC avc: denied { bpf } for pid=5943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:08.739000 audit: BPF prog-id=215 op=LOAD Dec 13 02:24:08.739000 audit[5943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000351068 items=0 ppid=2409 pid=5943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:08.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235306337623331386663363131353037343864346334303532393733 Dec 13 02:24:08.786060 env[1740]: time="2024-12-13T02:24:08.785998219Z" level=info msg="StartContainer for \"250c7b318fc61150748d4c4052973b4119bd0e82f68ac03467ebf1a0fb06d500\" returns successfully" Dec 13 02:24:10.413000 audit[5953]: AVC avc: denied { watch } for pid=5953 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:24:10.413000 audit[5953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b481b0 a2=fc6 a3=0 items=0 ppid=2409 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:24:10.413000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:24:10.414000 audit[5953]: AVC avc: denied { watch } for pid=5953 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:24:10.414000 audit[5953]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00057e180 a2=fc6 a3=0 items=0 ppid=2409 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c268,c423 key=(null) Dec 13 02:24:10.414000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:24:11.814336 systemd[1]: cri-containerd-d9e6a4799b4908a64aa8dda1b0bae69db2a63df8976abcb954bf41e8d686253f.scope: Deactivated successfully. Dec 13 02:24:11.814979 systemd[1]: cri-containerd-d9e6a4799b4908a64aa8dda1b0bae69db2a63df8976abcb954bf41e8d686253f.scope: Consumed 1.468s CPU time. Dec 13 02:24:11.819000 audit: BPF prog-id=81 op=UNLOAD Dec 13 02:24:11.819000 audit: BPF prog-id=99 op=UNLOAD Dec 13 02:24:11.885224 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d9e6a4799b4908a64aa8dda1b0bae69db2a63df8976abcb954bf41e8d686253f-rootfs.mount: Deactivated successfully. Dec 13 02:24:11.889277 env[1740]: time="2024-12-13T02:24:11.889224164Z" level=info msg="shim disconnected" id=d9e6a4799b4908a64aa8dda1b0bae69db2a63df8976abcb954bf41e8d686253f Dec 13 02:24:11.889277 env[1740]: time="2024-12-13T02:24:11.889279346Z" level=warning msg="cleaning up after shim disconnected" id=d9e6a4799b4908a64aa8dda1b0bae69db2a63df8976abcb954bf41e8d686253f namespace=k8s.io Dec 13 02:24:11.889825 env[1740]: time="2024-12-13T02:24:11.889293858Z" level=info msg="cleaning up dead shim" Dec 13 02:24:11.906590 env[1740]: time="2024-12-13T02:24:11.906534987Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:24:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5985 runtime=io.containerd.runc.v2\n" Dec 13 02:24:12.223616 systemd[1]: run-containerd-runc-k8s.io-7deba822c9fa6781bde666befbe9494f39b2897668fa21642489e0d38d418dfe-runc.n2Scqj.mount: Deactivated successfully. Dec 13 02:24:12.616756 kubelet[2815]: I1213 02:24:12.616721 2815 scope.go:117] "RemoveContainer" containerID="d9e6a4799b4908a64aa8dda1b0bae69db2a63df8976abcb954bf41e8d686253f" Dec 13 02:24:12.621643 env[1740]: time="2024-12-13T02:24:12.621593682Z" level=info msg="CreateContainer within sandbox \"3e46f25879824ed5bed1b6b156bf92091200d16ee23081bff88c084bc4485736\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Dec 13 02:24:12.650356 env[1740]: time="2024-12-13T02:24:12.650292682Z" level=info msg="CreateContainer within sandbox \"3e46f25879824ed5bed1b6b156bf92091200d16ee23081bff88c084bc4485736\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"6fa79bc0a6367de091e0789694a20f2bf3a61f4b65ed9d51ea304dda1254514b\"" Dec 13 02:24:12.652774 env[1740]: time="2024-12-13T02:24:12.652672762Z" level=info msg="StartContainer for \"6fa79bc0a6367de091e0789694a20f2bf3a61f4b65ed9d51ea304dda1254514b\"" Dec 13 02:24:12.690453 systemd[1]: Started cri-containerd-6fa79bc0a6367de091e0789694a20f2bf3a61f4b65ed9d51ea304dda1254514b.scope. Dec 13 02:24:12.745871 kernel: kauditd_printk_skb: 116 callbacks suppressed Dec 13 02:24:12.746032 kernel: audit: type=1400 audit(1734056652.741:1581): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.754872 kernel: audit: type=1400 audit(1734056652.741:1582): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.755012 kernel: audit: type=1400 audit(1734056652.741:1583): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.764075 kernel: audit: type=1400 audit(1734056652.741:1584): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.764229 kernel: audit: type=1400 audit(1734056652.741:1585): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.769801 kernel: audit: type=1400 audit(1734056652.741:1586): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.778349 kernel: audit: type=1400 audit(1734056652.741:1587): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.778820 kernel: audit: type=1400 audit(1734056652.741:1588): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.783962 kernel: audit: type=1400 audit(1734056652.741:1589): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.741000 audit: BPF prog-id=216 op=LOAD Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2441 pid=6027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:12.800191 kernel: audit: type=1400 audit(1734056652.741:1590): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613739626330613633363764653039316530373839363934613230 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2441 pid=6027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:12.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613739626330613633363764653039316530373839363934613230 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit: BPF prog-id=217 op=LOAD Dec 13 02:24:12.746000 audit[6027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c9d00 items=0 ppid=2441 pid=6027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:12.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613739626330613633363764653039316530373839363934613230 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit: BPF prog-id=218 op=LOAD Dec 13 02:24:12.746000 audit[6027]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c9d48 items=0 ppid=2441 pid=6027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:12.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613739626330613633363764653039316530373839363934613230 Dec 13 02:24:12.746000 audit: BPF prog-id=218 op=UNLOAD Dec 13 02:24:12.746000 audit: BPF prog-id=217 op=UNLOAD Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { perfmon } for pid=6027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit[6027]: AVC avc: denied { bpf } for pid=6027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:24:12.746000 audit: BPF prog-id=219 op=LOAD Dec 13 02:24:12.746000 audit[6027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c2158 items=0 ppid=2441 pid=6027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:24:12.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613739626330613633363764653039316530373839363934613230 Dec 13 02:24:12.830283 env[1740]: time="2024-12-13T02:24:12.830225766Z" level=info msg="StartContainer for \"6fa79bc0a6367de091e0789694a20f2bf3a61f4b65ed9d51ea304dda1254514b\" returns successfully" Dec 13 02:24:15.223027 kubelet[2815]: E1213 02:24:15.222960 2815 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-8?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 02:24:17.310161 systemd[1]: run-containerd-runc-k8s.io-53ea0fe001543acdb8ce2bb668deefd85a2767de1d48f6f63ffdbe42446ce79c-runc.IHWwUh.mount: Deactivated successfully. Dec 13 02:24:25.224182 kubelet[2815]: E1213 02:24:25.224070 2815 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.8:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-8?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"