Dec 13 14:24:12.163331 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:24:12.163352 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:24:12.163362 kernel: BIOS-provided physical RAM map: Dec 13 14:24:12.163368 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:24:12.163374 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:24:12.163380 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:24:12.163390 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Dec 13 14:24:12.163396 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Dec 13 14:24:12.163402 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Dec 13 14:24:12.163409 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:24:12.163415 kernel: NX (Execute Disable) protection: active Dec 13 14:24:12.163421 kernel: SMBIOS 2.7 present. Dec 13 14:24:12.163427 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Dec 13 14:24:12.163434 kernel: Hypervisor detected: KVM Dec 13 14:24:12.163444 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:24:12.163451 kernel: kvm-clock: cpu 0, msr 2419a001, primary cpu clock Dec 13 14:24:12.163458 kernel: kvm-clock: using sched offset of 8343926407 cycles Dec 13 14:24:12.163465 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:24:12.163472 kernel: tsc: Detected 2499.994 MHz processor Dec 13 14:24:12.163479 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:24:12.163489 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:24:12.163496 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Dec 13 14:24:12.163503 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:24:12.163510 kernel: Using GB pages for direct mapping Dec 13 14:24:12.163517 kernel: ACPI: Early table checksum verification disabled Dec 13 14:24:12.163523 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Dec 13 14:24:12.163530 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Dec 13 14:24:12.163548 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:24:12.163555 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Dec 13 14:24:12.163564 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Dec 13 14:24:12.163571 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 14:24:12.163578 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:24:12.163585 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Dec 13 14:24:12.163592 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:24:12.163599 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Dec 13 14:24:12.163606 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Dec 13 14:24:12.163613 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Dec 13 14:24:12.163622 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Dec 13 14:24:12.163629 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Dec 13 14:24:12.163636 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Dec 13 14:24:12.163647 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Dec 13 14:24:12.163654 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Dec 13 14:24:12.163661 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Dec 13 14:24:12.163669 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Dec 13 14:24:12.163679 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Dec 13 14:24:12.163686 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Dec 13 14:24:12.163693 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Dec 13 14:24:12.163700 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:24:12.163708 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:24:12.163715 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Dec 13 14:24:12.163723 kernel: NUMA: Initialized distance table, cnt=1 Dec 13 14:24:12.163730 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Dec 13 14:24:12.163739 kernel: Zone ranges: Dec 13 14:24:12.163747 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:24:12.163754 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Dec 13 14:24:12.163762 kernel: Normal empty Dec 13 14:24:12.163769 kernel: Movable zone start for each node Dec 13 14:24:12.163776 kernel: Early memory node ranges Dec 13 14:24:12.163784 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:24:12.163791 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Dec 13 14:24:12.163799 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Dec 13 14:24:12.163809 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:24:12.163817 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:24:12.163825 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Dec 13 14:24:12.163832 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:24:12.163840 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:24:12.163847 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Dec 13 14:24:12.163854 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:24:12.163862 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:24:12.163870 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:24:12.163879 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:24:12.163887 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:24:12.163894 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:24:12.163902 kernel: TSC deadline timer available Dec 13 14:24:12.163909 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:24:12.163917 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Dec 13 14:24:12.163924 kernel: Booting paravirtualized kernel on KVM Dec 13 14:24:12.163931 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:24:12.163939 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:24:12.163949 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:24:12.163956 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:24:12.163964 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:24:12.163971 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0 Dec 13 14:24:12.163978 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:24:12.163986 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:24:12.163993 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Dec 13 14:24:12.164000 kernel: Policy zone: DMA32 Dec 13 14:24:12.164009 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:24:12.164019 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:24:12.164026 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:24:12.164034 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:24:12.164041 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:24:12.164049 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123080K reserved, 0K cma-reserved) Dec 13 14:24:12.164056 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:24:12.164064 kernel: Kernel/User page tables isolation: enabled Dec 13 14:24:12.164072 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:24:12.164081 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:24:12.164089 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:24:12.164097 kernel: rcu: RCU event tracing is enabled. Dec 13 14:24:12.164104 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:24:12.164112 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:24:12.164120 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:24:12.164127 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:24:12.164135 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:24:12.164143 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:24:12.164152 kernel: random: crng init done Dec 13 14:24:12.164160 kernel: Console: colour VGA+ 80x25 Dec 13 14:24:12.164167 kernel: printk: console [ttyS0] enabled Dec 13 14:24:12.164174 kernel: ACPI: Core revision 20210730 Dec 13 14:24:12.164182 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Dec 13 14:24:12.164190 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:24:12.164197 kernel: x2apic enabled Dec 13 14:24:12.164205 kernel: Switched APIC routing to physical x2apic. Dec 13 14:24:12.164212 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns Dec 13 14:24:12.164222 kernel: Calibrating delay loop (skipped) preset value.. 4999.98 BogoMIPS (lpj=2499994) Dec 13 14:24:12.164230 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:24:12.164238 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:24:12.164245 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:24:12.164261 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:24:12.164270 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:24:12.164278 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:24:12.164286 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 14:24:12.164294 kernel: RETBleed: Vulnerable Dec 13 14:24:12.164302 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:24:12.164310 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:24:12.164317 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:24:12.164325 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:24:12.164332 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:24:12.164343 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:24:12.164351 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:24:12.164359 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 14:24:12.164367 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 14:24:12.164375 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 14:24:12.164385 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 14:24:12.164393 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 14:24:12.164400 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Dec 13 14:24:12.164408 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:24:12.164416 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 14:24:12.164424 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 14:24:12.164432 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Dec 13 14:24:12.164440 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Dec 13 14:24:12.164447 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Dec 13 14:24:12.164455 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Dec 13 14:24:12.164463 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Dec 13 14:24:12.164471 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:24:12.164481 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:24:12.164489 kernel: LSM: Security Framework initializing Dec 13 14:24:12.164496 kernel: SELinux: Initializing. Dec 13 14:24:12.164504 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:24:12.164512 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:24:12.164520 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 14:24:12.164528 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 14:24:12.164537 kernel: signal: max sigframe size: 3632 Dec 13 14:24:12.164554 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:24:12.164562 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:24:12.164572 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:24:12.164580 kernel: x86: Booting SMP configuration: Dec 13 14:24:12.164588 kernel: .... node #0, CPUs: #1 Dec 13 14:24:12.164596 kernel: kvm-clock: cpu 1, msr 2419a041, secondary cpu clock Dec 13 14:24:12.164605 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0 Dec 13 14:24:12.164613 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:24:12.164622 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:24:12.164630 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:24:12.164637 kernel: smpboot: Max logical packages: 1 Dec 13 14:24:12.164648 kernel: smpboot: Total of 2 processors activated (9999.97 BogoMIPS) Dec 13 14:24:12.164656 kernel: devtmpfs: initialized Dec 13 14:24:12.164664 kernel: x86/mm: Memory block size: 128MB Dec 13 14:24:12.164672 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:24:12.164681 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:24:12.164689 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:24:12.164697 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:24:12.164705 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:24:12.164713 kernel: audit: type=2000 audit(1734099852.092:1): state=initialized audit_enabled=0 res=1 Dec 13 14:24:12.164723 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:24:12.164731 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:24:12.164739 kernel: cpuidle: using governor menu Dec 13 14:24:12.164747 kernel: ACPI: bus type PCI registered Dec 13 14:24:12.164755 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:24:12.164763 kernel: dca service started, version 1.12.1 Dec 13 14:24:12.164771 kernel: PCI: Using configuration type 1 for base access Dec 13 14:24:12.164779 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:24:12.164787 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:24:12.164797 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:24:12.164805 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:24:12.164813 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:24:12.164821 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:24:12.164829 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:24:12.164838 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:24:12.164845 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:24:12.164854 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:24:12.164862 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:24:12.164872 kernel: ACPI: Interpreter enabled Dec 13 14:24:12.164881 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:24:12.164889 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:24:12.164897 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:24:12.164905 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:24:12.164913 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:24:12.165060 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:24:12.165148 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:24:12.165162 kernel: acpiphp: Slot [3] registered Dec 13 14:24:12.165170 kernel: acpiphp: Slot [4] registered Dec 13 14:24:12.165178 kernel: acpiphp: Slot [5] registered Dec 13 14:24:12.165186 kernel: acpiphp: Slot [6] registered Dec 13 14:24:12.165194 kernel: acpiphp: Slot [7] registered Dec 13 14:24:12.165202 kernel: acpiphp: Slot [8] registered Dec 13 14:24:12.165210 kernel: acpiphp: Slot [9] registered Dec 13 14:24:12.165218 kernel: acpiphp: Slot [10] registered Dec 13 14:24:12.165226 kernel: acpiphp: Slot [11] registered Dec 13 14:24:12.165236 kernel: acpiphp: Slot [12] registered Dec 13 14:24:12.165244 kernel: acpiphp: Slot [13] registered Dec 13 14:24:12.165252 kernel: acpiphp: Slot [14] registered Dec 13 14:24:12.165260 kernel: acpiphp: Slot [15] registered Dec 13 14:24:12.165268 kernel: acpiphp: Slot [16] registered Dec 13 14:24:12.165276 kernel: acpiphp: Slot [17] registered Dec 13 14:24:12.165284 kernel: acpiphp: Slot [18] registered Dec 13 14:24:12.165292 kernel: acpiphp: Slot [19] registered Dec 13 14:24:12.165300 kernel: acpiphp: Slot [20] registered Dec 13 14:24:12.165310 kernel: acpiphp: Slot [21] registered Dec 13 14:24:12.165318 kernel: acpiphp: Slot [22] registered Dec 13 14:24:12.165326 kernel: acpiphp: Slot [23] registered Dec 13 14:24:12.165334 kernel: acpiphp: Slot [24] registered Dec 13 14:24:12.165342 kernel: acpiphp: Slot [25] registered Dec 13 14:24:12.165349 kernel: acpiphp: Slot [26] registered Dec 13 14:24:12.165357 kernel: acpiphp: Slot [27] registered Dec 13 14:24:12.165365 kernel: acpiphp: Slot [28] registered Dec 13 14:24:12.165373 kernel: acpiphp: Slot [29] registered Dec 13 14:24:12.165381 kernel: acpiphp: Slot [30] registered Dec 13 14:24:12.165391 kernel: acpiphp: Slot [31] registered Dec 13 14:24:12.165399 kernel: PCI host bridge to bus 0000:00 Dec 13 14:24:12.165488 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:24:12.165575 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:24:12.165650 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:24:12.165722 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 14:24:12.165795 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:24:12.165894 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:24:12.165990 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 14:24:12.166238 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Dec 13 14:24:12.166395 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:24:12.166528 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Dec 13 14:24:12.166708 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Dec 13 14:24:12.166850 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Dec 13 14:24:12.169023 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Dec 13 14:24:12.170175 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Dec 13 14:24:12.170377 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Dec 13 14:24:12.170507 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Dec 13 14:24:12.171392 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 10742 usecs Dec 13 14:24:12.172033 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Dec 13 14:24:12.172452 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Dec 13 14:24:12.172756 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Dec 13 14:24:12.172899 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:24:12.176508 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:24:12.176738 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Dec 13 14:24:12.176888 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:24:12.177026 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Dec 13 14:24:12.177052 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:24:12.177068 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:24:12.177084 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:24:12.177099 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:24:12.177114 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:24:12.177130 kernel: iommu: Default domain type: Translated Dec 13 14:24:12.177144 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:24:12.177280 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Dec 13 14:24:12.177417 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:24:12.177578 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Dec 13 14:24:12.177599 kernel: vgaarb: loaded Dec 13 14:24:12.177615 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:24:12.177633 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:24:12.178452 kernel: PTP clock support registered Dec 13 14:24:12.178476 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:24:12.178491 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:24:12.178506 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:24:12.178527 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Dec 13 14:24:12.178560 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Dec 13 14:24:12.178575 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Dec 13 14:24:12.178590 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:24:12.178605 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:24:12.178620 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:24:12.178636 kernel: pnp: PnP ACPI init Dec 13 14:24:12.178650 kernel: pnp: PnP ACPI: found 5 devices Dec 13 14:24:12.178665 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:24:12.178683 kernel: NET: Registered PF_INET protocol family Dec 13 14:24:12.178698 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:24:12.178713 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:24:12.178729 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:24:12.178744 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:24:12.178759 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:24:12.178773 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:24:12.178788 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:24:12.178803 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:24:12.178821 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:24:12.178836 kernel: NET: Registered PF_XDP protocol family Dec 13 14:24:12.179123 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:24:12.179256 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:24:12.179382 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:24:12.179634 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 14:24:12.179788 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:24:12.179938 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 14:24:12.179965 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:24:12.179980 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:24:12.179995 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns Dec 13 14:24:12.180270 kernel: clocksource: Switched to clocksource tsc Dec 13 14:24:12.180286 kernel: Initialise system trusted keyrings Dec 13 14:24:12.180299 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:24:12.180313 kernel: Key type asymmetric registered Dec 13 14:24:12.180328 kernel: Asymmetric key parser 'x509' registered Dec 13 14:24:12.180347 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:24:12.180362 kernel: io scheduler mq-deadline registered Dec 13 14:24:12.180378 kernel: io scheduler kyber registered Dec 13 14:24:12.180393 kernel: io scheduler bfq registered Dec 13 14:24:12.180408 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:24:12.180423 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:24:12.180438 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:24:12.180453 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:24:12.180467 kernel: i8042: Warning: Keylock active Dec 13 14:24:12.180485 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:24:12.180500 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:24:12.180684 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:24:12.180815 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:24:12.181032 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:24:11 UTC (1734099851) Dec 13 14:24:12.181166 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:24:12.181186 kernel: intel_pstate: CPU model not supported Dec 13 14:24:12.181202 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:24:12.181221 kernel: Segment Routing with IPv6 Dec 13 14:24:12.181236 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:24:12.181251 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:24:12.181266 kernel: Key type dns_resolver registered Dec 13 14:24:12.181334 kernel: IPI shorthand broadcast: enabled Dec 13 14:24:12.181349 kernel: sched_clock: Marking stable (531296006, 256988054)->(925354561, -137070501) Dec 13 14:24:12.181364 kernel: registered taskstats version 1 Dec 13 14:24:12.181379 kernel: Loading compiled-in X.509 certificates Dec 13 14:24:12.181474 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:24:12.181492 kernel: Key type .fscrypt registered Dec 13 14:24:12.181507 kernel: Key type fscrypt-provisioning registered Dec 13 14:24:12.181522 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:24:12.181558 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:24:12.181571 kernel: ima: No architecture policies found Dec 13 14:24:12.181585 kernel: clk: Disabling unused clocks Dec 13 14:24:12.181600 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:24:12.181615 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:24:12.181675 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:24:12.181699 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:24:12.181715 kernel: Run /init as init process Dec 13 14:24:12.181731 kernel: with arguments: Dec 13 14:24:12.181746 kernel: /init Dec 13 14:24:12.181761 kernel: with environment: Dec 13 14:24:12.181775 kernel: HOME=/ Dec 13 14:24:12.181790 kernel: TERM=linux Dec 13 14:24:12.181804 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:24:12.181823 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:24:12.181845 systemd[1]: Detected virtualization amazon. Dec 13 14:24:12.181861 systemd[1]: Detected architecture x86-64. Dec 13 14:24:12.181878 systemd[1]: Running in initrd. Dec 13 14:24:12.181908 systemd[1]: No hostname configured, using default hostname. Dec 13 14:24:12.181927 systemd[1]: Hostname set to . Dec 13 14:24:12.181946 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:24:12.182120 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:24:12.182148 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:24:12.182165 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:24:12.182182 systemd[1]: Reached target cryptsetup.target. Dec 13 14:24:12.182198 systemd[1]: Reached target paths.target. Dec 13 14:24:12.182214 systemd[1]: Reached target slices.target. Dec 13 14:24:12.182233 systemd[1]: Reached target swap.target. Dec 13 14:24:12.182252 systemd[1]: Reached target timers.target. Dec 13 14:24:12.182270 systemd[1]: Listening on iscsid.socket. Dec 13 14:24:12.182286 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:24:12.182374 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:24:12.182393 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:24:12.182410 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:24:12.182427 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:24:12.182666 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:24:12.182693 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:24:12.182711 systemd[1]: Reached target sockets.target. Dec 13 14:24:12.182726 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:24:12.182743 systemd[1]: Finished network-cleanup.service. Dec 13 14:24:12.182760 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:24:12.182777 systemd[1]: Starting systemd-journald.service... Dec 13 14:24:12.182794 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:24:12.182817 systemd-journald[185]: Journal started Dec 13 14:24:12.182904 systemd-journald[185]: Runtime Journal (/run/log/journal/ec24651d7e58dcb290f4123949b4d9c9) is 4.8M, max 38.7M, 33.9M free. Dec 13 14:24:12.188871 systemd[1]: Starting systemd-resolved.service... Dec 13 14:24:12.189097 kernel: audit: type=1334 audit(1734099852.183:2): prog-id=6 op=LOAD Dec 13 14:24:12.183000 audit: BPF prog-id=6 op=LOAD Dec 13 14:24:12.196572 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:24:12.196938 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 14:24:12.392162 systemd[1]: Started systemd-journald.service. Dec 13 14:24:12.392201 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:24:12.392267 kernel: Bridge firewalling registered Dec 13 14:24:12.392297 kernel: SCSI subsystem initialized Dec 13 14:24:12.392315 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:24:12.392335 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:24:12.392351 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:24:12.261176 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 14:24:12.396646 kernel: audit: type=1130 audit(1734099852.391:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.289322 systemd-resolved[188]: Positive Trust Anchors: Dec 13 14:24:12.289334 systemd-resolved[188]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:24:12.289381 systemd-resolved[188]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:24:12.425003 kernel: audit: type=1130 audit(1734099852.402:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.300330 systemd-resolved[188]: Defaulting to hostname 'linux'. Dec 13 14:24:12.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.310452 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 14:24:12.431825 kernel: audit: type=1130 audit(1734099852.424:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.399183 systemd[1]: Started systemd-resolved.service. Dec 13 14:24:12.402965 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:24:12.454497 kernel: audit: type=1130 audit(1734099852.431:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.454531 kernel: audit: type=1130 audit(1734099852.433:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.454572 kernel: audit: type=1130 audit(1734099852.447:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.425306 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:24:12.432326 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:24:12.436514 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:24:12.448887 systemd[1]: Reached target nss-lookup.target. Dec 13 14:24:12.455706 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:24:12.467291 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:24:12.469052 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:24:12.479166 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:24:12.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.492565 kernel: audit: type=1130 audit(1734099852.478:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.493882 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:24:12.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.499603 kernel: audit: type=1130 audit(1734099852.493:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.500980 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:24:12.502476 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:24:12.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.515458 dracut-cmdline[206]: dracut-dracut-053 Dec 13 14:24:12.518284 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:24:12.611657 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:24:12.633568 kernel: iscsi: registered transport (tcp) Dec 13 14:24:12.661576 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:24:12.661643 kernel: QLogic iSCSI HBA Driver Dec 13 14:24:12.696735 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:24:12.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:12.700388 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:24:12.763576 kernel: raid6: avx512x4 gen() 12388 MB/s Dec 13 14:24:12.781569 kernel: raid6: avx512x4 xor() 5854 MB/s Dec 13 14:24:12.799569 kernel: raid6: avx512x2 gen() 13371 MB/s Dec 13 14:24:12.819218 kernel: raid6: avx512x2 xor() 13198 MB/s Dec 13 14:24:12.838585 kernel: raid6: avx512x1 gen() 6688 MB/s Dec 13 14:24:12.858604 kernel: raid6: avx512x1 xor() 8442 MB/s Dec 13 14:24:12.875582 kernel: raid6: avx2x4 gen() 7754 MB/s Dec 13 14:24:12.892639 kernel: raid6: avx2x4 xor() 5404 MB/s Dec 13 14:24:12.911611 kernel: raid6: avx2x2 gen() 13280 MB/s Dec 13 14:24:12.928682 kernel: raid6: avx2x2 xor() 11783 MB/s Dec 13 14:24:12.946574 kernel: raid6: avx2x1 gen() 10551 MB/s Dec 13 14:24:12.963604 kernel: raid6: avx2x1 xor() 12916 MB/s Dec 13 14:24:12.982619 kernel: raid6: sse2x4 gen() 7157 MB/s Dec 13 14:24:12.999569 kernel: raid6: sse2x4 xor() 3478 MB/s Dec 13 14:24:13.020644 kernel: raid6: sse2x2 gen() 4059 MB/s Dec 13 14:24:13.039586 kernel: raid6: sse2x2 xor() 1218 MB/s Dec 13 14:24:13.056593 kernel: raid6: sse2x1 gen() 5433 MB/s Dec 13 14:24:13.074937 kernel: raid6: sse2x1 xor() 2207 MB/s Dec 13 14:24:13.075011 kernel: raid6: using algorithm avx512x2 gen() 13371 MB/s Dec 13 14:24:13.075029 kernel: raid6: .... xor() 13198 MB/s, rmw enabled Dec 13 14:24:13.076137 kernel: raid6: using avx512x2 recovery algorithm Dec 13 14:24:13.097115 kernel: xor: automatically using best checksumming function avx Dec 13 14:24:13.239569 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:24:13.250514 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:24:13.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.252000 audit: BPF prog-id=7 op=LOAD Dec 13 14:24:13.252000 audit: BPF prog-id=8 op=LOAD Dec 13 14:24:13.253207 systemd[1]: Starting systemd-udevd.service... Dec 13 14:24:13.269273 systemd-udevd[384]: Using default interface naming scheme 'v252'. Dec 13 14:24:13.275494 systemd[1]: Started systemd-udevd.service. Dec 13 14:24:13.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.277698 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:24:13.298562 dracut-pre-trigger[388]: rd.md=0: removing MD RAID activation Dec 13 14:24:13.333949 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:24:13.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.336720 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:24:13.427914 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:24:13.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:13.547505 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:24:13.584205 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:24:13.584364 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:24:13.584383 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Dec 13 14:24:13.584509 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:24:13.584803 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 14:24:13.584822 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:b8:c9:05:83:3f Dec 13 14:24:13.591601 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:24:13.595562 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:24:13.595691 kernel: AES CTR mode by8 optimization enabled Dec 13 14:24:13.596608 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:24:13.596647 kernel: GPT:9289727 != 16777215 Dec 13 14:24:13.596663 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:24:13.596684 kernel: GPT:9289727 != 16777215 Dec 13 14:24:13.596701 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:24:13.596717 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:24:13.599786 (udev-worker)[433]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:24:13.718801 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (441) Dec 13 14:24:13.757593 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:24:13.790323 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:24:13.793589 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:24:13.795888 systemd[1]: Starting disk-uuid.service... Dec 13 14:24:13.809886 disk-uuid[593]: Primary Header is updated. Dec 13 14:24:13.809886 disk-uuid[593]: Secondary Entries is updated. Dec 13 14:24:13.809886 disk-uuid[593]: Secondary Header is updated. Dec 13 14:24:13.815882 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:24:13.828271 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:24:14.824597 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:24:14.825723 disk-uuid[594]: The operation has completed successfully. Dec 13 14:24:15.024388 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:24:15.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.024502 systemd[1]: Finished disk-uuid.service. Dec 13 14:24:15.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.036060 systemd[1]: Starting verity-setup.service... Dec 13 14:24:15.073566 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:24:15.225115 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:24:15.229872 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:24:15.249061 systemd[1]: Finished verity-setup.service. Dec 13 14:24:15.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.409373 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:24:15.409983 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:24:15.412156 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:24:15.416077 systemd[1]: Starting ignition-setup.service... Dec 13 14:24:15.417873 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:24:15.441866 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:24:15.441926 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:24:15.443244 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:24:15.454560 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:24:15.467489 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:24:15.481910 systemd[1]: Finished ignition-setup.service. Dec 13 14:24:15.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.487053 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:24:15.524835 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:24:15.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.529000 audit: BPF prog-id=9 op=LOAD Dec 13 14:24:15.535968 systemd[1]: Starting systemd-networkd.service... Dec 13 14:24:15.609677 systemd-networkd[939]: lo: Link UP Dec 13 14:24:15.609689 systemd-networkd[939]: lo: Gained carrier Dec 13 14:24:15.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.610785 systemd-networkd[939]: Enumeration completed Dec 13 14:24:15.610910 systemd[1]: Started systemd-networkd.service. Dec 13 14:24:15.611268 systemd-networkd[939]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:24:15.612847 systemd[1]: Reached target network.target. Dec 13 14:24:15.622328 systemd-networkd[939]: eth0: Link UP Dec 13 14:24:15.622452 systemd-networkd[939]: eth0: Gained carrier Dec 13 14:24:15.624959 systemd[1]: Starting iscsiuio.service... Dec 13 14:24:15.636219 systemd[1]: Started iscsiuio.service. Dec 13 14:24:15.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.640137 systemd[1]: Starting iscsid.service... Dec 13 14:24:15.644739 systemd-networkd[939]: eth0: DHCPv4 address 172.31.28.110/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:24:15.648175 iscsid[944]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:24:15.648175 iscsid[944]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:24:15.648175 iscsid[944]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:24:15.648175 iscsid[944]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:24:15.648175 iscsid[944]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:24:15.648175 iscsid[944]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:24:15.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.649754 systemd[1]: Started iscsid.service. Dec 13 14:24:15.667007 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:24:15.711659 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:24:15.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:15.711920 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:24:15.714968 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:24:15.716337 systemd[1]: Reached target remote-fs.target. Dec 13 14:24:15.720809 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:24:15.737947 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:24:15.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.370571 ignition[903]: Ignition 2.14.0 Dec 13 14:24:16.370607 ignition[903]: Stage: fetch-offline Dec 13 14:24:16.370791 ignition[903]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:16.370840 ignition[903]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:24:16.411311 ignition[903]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:24:16.411985 ignition[903]: Ignition finished successfully Dec 13 14:24:16.419243 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:24:16.421612 systemd[1]: Starting ignition-fetch.service... Dec 13 14:24:16.435772 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 14:24:16.435818 kernel: audit: type=1130 audit(1734099856.419:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.445188 ignition[963]: Ignition 2.14.0 Dec 13 14:24:16.445201 ignition[963]: Stage: fetch Dec 13 14:24:16.445402 ignition[963]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:16.445432 ignition[963]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:24:16.455120 ignition[963]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:24:16.457096 ignition[963]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:24:16.512051 ignition[963]: INFO : PUT result: OK Dec 13 14:24:16.518120 ignition[963]: DEBUG : parsed url from cmdline: "" Dec 13 14:24:16.518120 ignition[963]: INFO : no config URL provided Dec 13 14:24:16.518120 ignition[963]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:24:16.518120 ignition[963]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:24:16.528659 ignition[963]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:24:16.528659 ignition[963]: INFO : PUT result: OK Dec 13 14:24:16.528659 ignition[963]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:24:16.537715 ignition[963]: INFO : GET result: OK Dec 13 14:24:16.539708 ignition[963]: DEBUG : parsing config with SHA512: f28885ae9c267dc397c88864b3729be96d38e251a107e30a25082f8aa0fa18efc68bdd5b7a2e0160db19cfbf9c622d344064bdf91f9e5ec3939fbcaa00e9c195 Dec 13 14:24:16.548532 unknown[963]: fetched base config from "system" Dec 13 14:24:16.548567 unknown[963]: fetched base config from "system" Dec 13 14:24:16.548577 unknown[963]: fetched user config from "aws" Dec 13 14:24:16.553733 ignition[963]: fetch: fetch complete Dec 13 14:24:16.553748 ignition[963]: fetch: fetch passed Dec 13 14:24:16.553831 ignition[963]: Ignition finished successfully Dec 13 14:24:16.559064 systemd[1]: Finished ignition-fetch.service. Dec 13 14:24:16.560642 systemd[1]: Starting ignition-kargs.service... Dec 13 14:24:16.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.567396 kernel: audit: type=1130 audit(1734099856.558:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.580118 ignition[969]: Ignition 2.14.0 Dec 13 14:24:16.580133 ignition[969]: Stage: kargs Dec 13 14:24:16.580675 ignition[969]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:16.580728 ignition[969]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:24:16.593472 ignition[969]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:24:16.594931 ignition[969]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:24:16.596558 ignition[969]: INFO : PUT result: OK Dec 13 14:24:16.601887 ignition[969]: kargs: kargs passed Dec 13 14:24:16.602233 ignition[969]: Ignition finished successfully Dec 13 14:24:16.604811 systemd[1]: Finished ignition-kargs.service. Dec 13 14:24:16.612869 kernel: audit: type=1130 audit(1734099856.605:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.607948 systemd[1]: Starting ignition-disks.service... Dec 13 14:24:16.623256 ignition[975]: Ignition 2.14.0 Dec 13 14:24:16.623265 ignition[975]: Stage: disks Dec 13 14:24:16.623419 ignition[975]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:16.623441 ignition[975]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:24:16.634101 ignition[975]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:24:16.635651 ignition[975]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:24:16.640492 ignition[975]: INFO : PUT result: OK Dec 13 14:24:16.646190 ignition[975]: disks: disks passed Dec 13 14:24:16.646266 ignition[975]: Ignition finished successfully Dec 13 14:24:16.648057 systemd[1]: Finished ignition-disks.service. Dec 13 14:24:16.658489 kernel: audit: type=1130 audit(1734099856.648:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.649190 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:24:16.658488 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:24:16.659821 systemd[1]: Reached target local-fs.target. Dec 13 14:24:16.662052 systemd[1]: Reached target sysinit.target. Dec 13 14:24:16.663101 systemd[1]: Reached target basic.target. Dec 13 14:24:16.668134 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:24:16.763393 systemd-fsck[983]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:24:16.776154 kernel: audit: type=1130 audit(1734099856.769:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:16.768500 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:24:16.771289 systemd[1]: Mounting sysroot.mount... Dec 13 14:24:16.806386 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:24:16.808931 systemd[1]: Mounted sysroot.mount. Dec 13 14:24:16.812739 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:24:16.824580 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:24:16.827098 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:24:16.827142 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:24:16.827170 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:24:16.837872 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:24:16.860532 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:24:16.864330 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:24:16.887397 initrd-setup-root[1005]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:24:16.894564 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1000) Dec 13 14:24:16.897455 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:24:16.897519 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:24:16.897561 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:24:16.903164 initrd-setup-root[1029]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:24:16.909589 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:24:16.910780 initrd-setup-root[1039]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:24:16.915725 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:24:16.920723 initrd-setup-root[1047]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:24:17.116025 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:24:17.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:17.119624 systemd[1]: Starting ignition-mount.service... Dec 13 14:24:17.127843 kernel: audit: type=1130 audit(1734099857.117:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:17.128222 systemd[1]: Starting sysroot-boot.service... Dec 13 14:24:17.136298 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:24:17.136681 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:24:17.168825 ignition[1065]: INFO : Ignition 2.14.0 Dec 13 14:24:17.170400 ignition[1065]: INFO : Stage: mount Dec 13 14:24:17.172470 ignition[1065]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:17.174467 ignition[1065]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:24:17.186770 ignition[1065]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:24:17.188741 ignition[1065]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:24:17.199634 ignition[1065]: INFO : PUT result: OK Dec 13 14:24:17.202362 systemd[1]: Finished sysroot-boot.service. Dec 13 14:24:17.208696 kernel: audit: type=1130 audit(1734099857.202:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:17.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:17.207871 systemd-networkd[939]: eth0: Gained IPv6LL Dec 13 14:24:17.213153 ignition[1065]: INFO : mount: mount passed Dec 13 14:24:17.214938 ignition[1065]: INFO : Ignition finished successfully Dec 13 14:24:17.217885 systemd[1]: Finished ignition-mount.service. Dec 13 14:24:17.219152 systemd[1]: Starting ignition-files.service... Dec 13 14:24:17.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:17.227566 kernel: audit: type=1130 audit(1734099857.217:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:17.231143 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:24:17.254262 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1075) Dec 13 14:24:17.254325 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:24:17.257317 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:24:17.257371 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:24:17.264619 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:24:17.269406 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:24:17.292244 ignition[1094]: INFO : Ignition 2.14.0 Dec 13 14:24:17.292244 ignition[1094]: INFO : Stage: files Dec 13 14:24:17.294347 ignition[1094]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:17.294347 ignition[1094]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:24:17.301892 ignition[1094]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:24:17.303683 ignition[1094]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:24:17.305454 ignition[1094]: INFO : PUT result: OK Dec 13 14:24:17.311896 ignition[1094]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:24:17.318119 ignition[1094]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:24:17.318119 ignition[1094]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:24:17.340205 ignition[1094]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:24:17.343529 ignition[1094]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:24:17.346068 unknown[1094]: wrote ssh authorized keys file for user: core Dec 13 14:24:17.348944 ignition[1094]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:24:17.353459 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:24:17.356804 ignition[1094]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:24:17.438059 ignition[1094]: INFO : GET result: OK Dec 13 14:24:18.229770 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:24:18.232329 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:24:18.232329 ignition[1094]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:24:18.241386 ignition[1094]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1799178937" Dec 13 14:24:18.246056 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1096) Dec 13 14:24:18.246150 ignition[1094]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1799178937": device or resource busy Dec 13 14:24:18.246150 ignition[1094]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1799178937", trying btrfs: device or resource busy Dec 13 14:24:18.246150 ignition[1094]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1799178937" Dec 13 14:24:18.246150 ignition[1094]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1799178937" Dec 13 14:24:18.259487 ignition[1094]: INFO : op(3): [started] unmounting "/mnt/oem1799178937" Dec 13 14:24:18.261375 ignition[1094]: INFO : op(3): [finished] unmounting "/mnt/oem1799178937" Dec 13 14:24:18.261375 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:24:18.261375 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:24:18.261375 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:24:18.261375 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:24:18.261375 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:24:18.261375 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:24:18.261375 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:24:18.261375 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:24:18.261375 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:24:18.291086 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:24:18.291086 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:24:18.291086 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:24:18.291086 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:24:18.291086 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:24:18.291086 ignition[1094]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:24:18.307647 systemd[1]: mnt-oem1799178937.mount: Deactivated successfully. Dec 13 14:24:18.315070 ignition[1094]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1311174944" Dec 13 14:24:18.316624 ignition[1094]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1311174944": device or resource busy Dec 13 14:24:18.316624 ignition[1094]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1311174944", trying btrfs: device or resource busy Dec 13 14:24:18.316624 ignition[1094]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1311174944" Dec 13 14:24:18.331088 ignition[1094]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1311174944" Dec 13 14:24:18.331088 ignition[1094]: INFO : op(6): [started] unmounting "/mnt/oem1311174944" Dec 13 14:24:18.331088 ignition[1094]: INFO : op(6): [finished] unmounting "/mnt/oem1311174944" Dec 13 14:24:18.331088 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:24:18.331088 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:24:18.331088 ignition[1094]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:24:18.322384 systemd[1]: mnt-oem1311174944.mount: Deactivated successfully. Dec 13 14:24:18.375350 ignition[1094]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2711867929" Dec 13 14:24:18.377437 ignition[1094]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2711867929": device or resource busy Dec 13 14:24:18.377437 ignition[1094]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2711867929", trying btrfs: device or resource busy Dec 13 14:24:18.377437 ignition[1094]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2711867929" Dec 13 14:24:18.386222 ignition[1094]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2711867929" Dec 13 14:24:18.388159 ignition[1094]: INFO : op(9): [started] unmounting "/mnt/oem2711867929" Dec 13 14:24:18.389748 ignition[1094]: INFO : op(9): [finished] unmounting "/mnt/oem2711867929" Dec 13 14:24:18.389748 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:24:18.393626 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:24:18.396689 ignition[1094]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:24:18.402815 ignition[1094]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4054693911" Dec 13 14:24:18.404472 ignition[1094]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4054693911": device or resource busy Dec 13 14:24:18.404472 ignition[1094]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4054693911", trying btrfs: device or resource busy Dec 13 14:24:18.404472 ignition[1094]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4054693911" Dec 13 14:24:18.404472 ignition[1094]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4054693911" Dec 13 14:24:18.404472 ignition[1094]: INFO : op(c): [started] unmounting "/mnt/oem4054693911" Dec 13 14:24:18.423551 ignition[1094]: INFO : op(c): [finished] unmounting "/mnt/oem4054693911" Dec 13 14:24:18.423551 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:24:18.423551 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:24:18.423551 ignition[1094]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:24:18.853232 ignition[1094]: INFO : GET result: OK Dec 13 14:24:19.325657 ignition[1094]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:24:19.325657 ignition[1094]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:24:19.325657 ignition[1094]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:24:19.325657 ignition[1094]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(12): [started] processing unit "nvidia.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(12): [finished] processing unit "nvidia.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(16): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(16): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:24:19.336332 ignition[1094]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:24:19.389422 ignition[1094]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:24:19.389422 ignition[1094]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:24:19.389422 ignition[1094]: INFO : files: files passed Dec 13 14:24:19.389422 ignition[1094]: INFO : Ignition finished successfully Dec 13 14:24:19.420933 systemd[1]: Finished ignition-files.service. Dec 13 14:24:19.454684 kernel: audit: type=1130 audit(1734099859.427:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.453736 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:24:19.454977 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:24:19.455945 systemd[1]: Starting ignition-quench.service... Dec 13 14:24:19.464507 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:24:19.466183 systemd[1]: Finished ignition-quench.service. Dec 13 14:24:19.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.472565 kernel: audit: type=1130 audit(1734099859.467:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.477314 initrd-setup-root-after-ignition[1119]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:24:19.480066 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:24:19.484585 systemd[1]: Reached target ignition-complete.target. Dec 13 14:24:19.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.487782 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:24:19.508870 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:24:19.508997 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:24:19.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.512061 systemd[1]: Reached target initrd-fs.target. Dec 13 14:24:19.514277 systemd[1]: Reached target initrd.target. Dec 13 14:24:19.516274 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:24:19.518818 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:24:19.531811 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:24:19.532753 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:24:19.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.544555 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:24:19.546811 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:24:19.549239 systemd[1]: Stopped target timers.target. Dec 13 14:24:19.551882 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:24:19.552147 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:24:19.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.554344 systemd[1]: Stopped target initrd.target. Dec 13 14:24:19.556709 systemd[1]: Stopped target basic.target. Dec 13 14:24:19.558606 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:24:19.561997 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:24:19.566005 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:24:19.568239 systemd[1]: Stopped target remote-fs.target. Dec 13 14:24:19.571696 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:24:19.573406 systemd[1]: Stopped target sysinit.target. Dec 13 14:24:19.577982 systemd[1]: Stopped target local-fs.target. Dec 13 14:24:19.581216 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:24:19.583803 systemd[1]: Stopped target swap.target. Dec 13 14:24:19.585087 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:24:19.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.586334 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:24:19.587839 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:24:19.591580 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:24:19.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.592516 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:24:19.595304 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:24:19.597270 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:24:19.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.599867 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:24:19.600967 systemd[1]: Stopped ignition-files.service. Dec 13 14:24:19.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.605195 systemd[1]: Stopping ignition-mount.service... Dec 13 14:24:19.606225 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:24:19.606398 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:24:19.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.634757 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:24:19.643876 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:24:19.648334 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:24:19.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.664437 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:24:19.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.664655 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:24:19.670499 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:24:19.670642 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:24:19.675888 ignition[1132]: INFO : Ignition 2.14.0 Dec 13 14:24:19.675888 ignition[1132]: INFO : Stage: umount Dec 13 14:24:19.678831 ignition[1132]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:24:19.678831 ignition[1132]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:24:19.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.696309 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:24:19.701724 ignition[1132]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:24:19.703637 ignition[1132]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:24:19.706191 ignition[1132]: INFO : PUT result: OK Dec 13 14:24:19.710531 ignition[1132]: INFO : umount: umount passed Dec 13 14:24:19.711769 ignition[1132]: INFO : Ignition finished successfully Dec 13 14:24:19.713669 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:24:19.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.713830 systemd[1]: Stopped ignition-mount.service. Dec 13 14:24:19.716523 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:24:19.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.716593 systemd[1]: Stopped ignition-disks.service. Dec 13 14:24:19.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.719819 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:24:19.719880 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:24:19.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.720925 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:24:19.721906 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:24:19.723349 systemd[1]: Stopped target network.target. Dec 13 14:24:19.724456 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:24:19.724513 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:24:19.727342 systemd[1]: Stopped target paths.target. Dec 13 14:24:19.731640 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:24:19.740021 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:24:19.742249 systemd[1]: Stopped target slices.target. Dec 13 14:24:19.751560 systemd[1]: Stopped target sockets.target. Dec 13 14:24:19.764435 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:24:19.767238 systemd[1]: Closed iscsid.socket. Dec 13 14:24:19.775713 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:24:19.775933 systemd[1]: Closed iscsiuio.socket. Dec 13 14:24:19.778770 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:24:19.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.778835 systemd[1]: Stopped ignition-setup.service. Dec 13 14:24:19.780250 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:24:19.781329 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:24:19.784652 systemd-networkd[939]: eth0: DHCPv6 lease lost Dec 13 14:24:19.788151 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:24:19.788269 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:24:19.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.797191 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:24:19.798529 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:24:19.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.803000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:24:19.803000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:24:19.804714 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:24:19.804929 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:24:19.811841 systemd[1]: Stopping network-cleanup.service... Dec 13 14:24:19.813761 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:24:19.814846 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:24:19.817982 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:24:19.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.818051 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:24:19.820411 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:24:19.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.820464 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:24:19.825388 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:24:19.833176 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:24:19.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.846235 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:24:19.846445 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:24:19.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.854228 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:24:19.854292 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:24:19.865391 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:24:19.865756 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:24:19.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.869019 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:24:19.869486 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:24:19.871224 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:24:19.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:19.871294 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:24:19.877652 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:24:19.877727 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:24:19.881054 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:24:19.890664 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:24:19.890748 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:24:19.893559 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:24:19.893688 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:24:19.894100 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:24:19.894201 systemd[1]: Stopped network-cleanup.service. Dec 13 14:24:19.894397 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:24:19.894442 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:24:19.896404 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:24:19.896519 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:24:19.897279 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:24:19.898442 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:24:19.933334 systemd[1]: Switching root. Dec 13 14:24:19.961197 iscsid[944]: iscsid shutting down. Dec 13 14:24:19.962397 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Dec 13 14:24:19.962472 systemd-journald[185]: Journal stopped Dec 13 14:24:27.074920 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:24:27.075005 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:24:27.075024 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:24:27.075052 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:24:27.075069 kernel: SELinux: policy capability open_perms=1 Dec 13 14:24:27.075087 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:24:27.075105 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:24:27.075127 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:24:27.075144 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:24:27.075161 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:24:27.075178 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:24:27.075197 systemd[1]: Successfully loaded SELinux policy in 117.897ms. Dec 13 14:24:27.075238 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 14.657ms. Dec 13 14:24:27.075257 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:24:27.075276 systemd[1]: Detected virtualization amazon. Dec 13 14:24:27.075293 systemd[1]: Detected architecture x86-64. Dec 13 14:24:27.075309 systemd[1]: Detected first boot. Dec 13 14:24:27.075327 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:24:27.075344 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:24:27.075362 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:24:27.087343 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:24:27.087444 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:24:27.087471 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:24:27.087493 kernel: kauditd_printk_skb: 54 callbacks suppressed Dec 13 14:24:27.087514 kernel: audit: type=1334 audit(1734099866.580:87): prog-id=12 op=LOAD Dec 13 14:24:27.087533 kernel: audit: type=1334 audit(1734099866.580:88): prog-id=3 op=UNLOAD Dec 13 14:24:27.087567 kernel: audit: type=1334 audit(1734099866.582:89): prog-id=13 op=LOAD Dec 13 14:24:27.087587 kernel: audit: type=1334 audit(1734099866.583:90): prog-id=14 op=LOAD Dec 13 14:24:27.087606 kernel: audit: type=1334 audit(1734099866.583:91): prog-id=4 op=UNLOAD Dec 13 14:24:27.087625 kernel: audit: type=1334 audit(1734099866.583:92): prog-id=5 op=UNLOAD Dec 13 14:24:27.087643 kernel: audit: type=1334 audit(1734099866.585:93): prog-id=15 op=LOAD Dec 13 14:24:27.087662 kernel: audit: type=1334 audit(1734099866.586:94): prog-id=12 op=UNLOAD Dec 13 14:24:27.087680 kernel: audit: type=1334 audit(1734099866.590:95): prog-id=16 op=LOAD Dec 13 14:24:27.087699 kernel: audit: type=1334 audit(1734099866.591:96): prog-id=17 op=LOAD Dec 13 14:24:27.087721 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:24:27.087741 systemd[1]: Stopped iscsiuio.service. Dec 13 14:24:27.087761 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:24:27.087780 systemd[1]: Stopped iscsid.service. Dec 13 14:24:27.087801 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:24:27.087821 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:24:27.087910 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:24:27.087938 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:24:27.088048 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:24:27.088069 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:24:27.088091 systemd[1]: Created slice system-getty.slice. Dec 13 14:24:27.088111 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:24:27.088131 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:24:27.088152 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:24:27.088180 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:24:27.088200 systemd[1]: Created slice user.slice. Dec 13 14:24:27.088223 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:24:27.088244 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:24:27.088264 systemd[1]: Set up automount boot.automount. Dec 13 14:24:27.088285 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:24:27.088305 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:24:27.088325 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:24:27.088345 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:24:27.088365 systemd[1]: Reached target integritysetup.target. Dec 13 14:24:27.088386 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:24:27.088406 systemd[1]: Reached target remote-fs.target. Dec 13 14:24:27.088428 systemd[1]: Reached target slices.target. Dec 13 14:24:27.088449 systemd[1]: Reached target swap.target. Dec 13 14:24:27.088468 systemd[1]: Reached target torcx.target. Dec 13 14:24:27.088488 systemd[1]: Reached target veritysetup.target. Dec 13 14:24:27.088509 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:24:27.088530 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:24:27.088562 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:24:27.088583 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:24:27.088604 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:24:27.088627 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:24:27.088649 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:24:27.088670 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:24:27.088690 systemd[1]: Mounting media.mount... Dec 13 14:24:27.088711 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:27.088732 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:24:27.088752 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:24:27.088773 systemd[1]: Mounting tmp.mount... Dec 13 14:24:27.088793 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:24:27.088816 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:24:27.088837 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:24:27.088857 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:24:27.088878 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:24:27.088898 systemd[1]: Starting modprobe@drm.service... Dec 13 14:24:27.088920 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:24:27.088940 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:24:27.088959 systemd[1]: Starting modprobe@loop.service... Dec 13 14:24:27.088981 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:24:27.089003 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:24:27.089022 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:24:27.089042 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:24:27.089062 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:24:27.089081 systemd[1]: Stopped systemd-journald.service. Dec 13 14:24:27.089100 systemd[1]: Starting systemd-journald.service... Dec 13 14:24:27.089123 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:24:27.089151 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:24:27.089171 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:24:27.089191 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:24:27.089211 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:24:27.089230 systemd[1]: Stopped verity-setup.service. Dec 13 14:24:27.089251 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:27.089271 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:24:27.089294 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:24:27.089314 systemd[1]: Mounted media.mount. Dec 13 14:24:27.089334 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:24:27.089353 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:24:27.089373 systemd[1]: Mounted tmp.mount. Dec 13 14:24:27.089393 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:24:27.089412 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:24:27.089432 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:24:27.089468 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:24:27.089490 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:24:27.089509 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:24:27.089529 systemd[1]: Finished modprobe@drm.service. Dec 13 14:24:27.089559 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:24:27.089578 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:24:27.089601 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:24:27.089621 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:24:27.089640 kernel: loop: module loaded Dec 13 14:24:27.089660 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:24:27.089680 systemd[1]: Reached target network-pre.target. Dec 13 14:24:27.089709 systemd-journald[1236]: Journal started Dec 13 14:24:27.089794 systemd-journald[1236]: Runtime Journal (/run/log/journal/ec24651d7e58dcb290f4123949b4d9c9) is 4.8M, max 38.7M, 33.9M free. Dec 13 14:24:20.845000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:24:21.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:24:21.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:24:21.018000 audit: BPF prog-id=10 op=LOAD Dec 13 14:24:21.018000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:24:21.018000 audit: BPF prog-id=11 op=LOAD Dec 13 14:24:21.018000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:24:21.341000 audit[1165]: AVC avc: denied { associate } for pid=1165 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:24:21.341000 audit[1165]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001800c2 a1=c00019a000 a2=c000198000 a3=32 items=0 ppid=1148 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.341000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:24:21.344000 audit[1165]: AVC avc: denied { associate } for pid=1165 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:24:21.344000 audit[1165]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000180199 a2=1ed a3=0 items=2 ppid=1148 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:21.344000 audit: CWD cwd="/" Dec 13 14:24:21.344000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:21.344000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:21.344000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:24:26.580000 audit: BPF prog-id=12 op=LOAD Dec 13 14:24:26.580000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:24:26.582000 audit: BPF prog-id=13 op=LOAD Dec 13 14:24:26.583000 audit: BPF prog-id=14 op=LOAD Dec 13 14:24:26.583000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:24:26.583000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:24:26.585000 audit: BPF prog-id=15 op=LOAD Dec 13 14:24:26.586000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:24:26.590000 audit: BPF prog-id=16 op=LOAD Dec 13 14:24:26.591000 audit: BPF prog-id=17 op=LOAD Dec 13 14:24:26.591000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:24:26.591000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:24:26.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:26.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:26.625000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:24:26.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:26.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:26.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:26.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:26.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:26.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:26.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:26.919000 audit: BPF prog-id=18 op=LOAD Dec 13 14:24:26.919000 audit: BPF prog-id=19 op=LOAD Dec 13 14:24:26.919000 audit: BPF prog-id=20 op=LOAD Dec 13 14:24:26.919000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:24:26.919000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:24:26.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.051000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:24:27.101723 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:24:27.101892 kernel: fuse: init (API version 7.34) Dec 13 14:24:27.106590 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:24:27.106651 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:24:27.051000 audit[1236]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffd12eb0800 a2=4000 a3=7ffd12eb089c items=0 ppid=1 pid=1236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:27.051000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:24:27.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:26.576398 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:24:21.320608 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:24:26.609916 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:24:21.328813 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:24:21.328836 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:24:21.328951 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:24:21.328963 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:24:21.329010 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:24:21.329024 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:24:21.329343 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:24:21.329395 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:24:21.329409 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:24:21.332588 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:24:21.332647 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:24:21.332676 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:24:21.332699 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:24:21.332728 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:24:21.332751 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:24:25.765445 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:24:25.765742 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:24:25.765884 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:24:25.766126 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:24:25.766178 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:24:25.766237 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:24:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:24:27.113581 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:24:27.117945 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:24:27.133342 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:24:27.133420 systemd[1]: Started systemd-journald.service. Dec 13 14:24:27.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.127206 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:24:27.127473 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:24:27.128998 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:24:27.129368 systemd[1]: Finished modprobe@loop.service. Dec 13 14:24:27.131048 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:24:27.135610 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:24:27.144434 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:24:27.145664 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:24:27.147712 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:24:27.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.150084 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:24:27.151928 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:24:27.161938 systemd-journald[1236]: Time spent on flushing to /var/log/journal/ec24651d7e58dcb290f4123949b4d9c9 is 102.148ms for 1190 entries. Dec 13 14:24:27.161938 systemd-journald[1236]: System Journal (/var/log/journal/ec24651d7e58dcb290f4123949b4d9c9) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:24:27.276391 systemd-journald[1236]: Received client request to flush runtime journal. Dec 13 14:24:27.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.219405 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:24:27.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.257220 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:24:27.280581 udevadm[1273]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:24:27.260650 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:24:27.277980 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:24:27.288460 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:24:27.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.292822 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:24:27.473461 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:24:27.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:27.998797 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:24:28.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:28.000000 audit: BPF prog-id=21 op=LOAD Dec 13 14:24:28.000000 audit: BPF prog-id=22 op=LOAD Dec 13 14:24:28.000000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:24:28.000000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:24:28.002346 systemd[1]: Starting systemd-udevd.service... Dec 13 14:24:28.040090 systemd-udevd[1283]: Using default interface naming scheme 'v252'. Dec 13 14:24:28.129454 systemd[1]: Started systemd-udevd.service. Dec 13 14:24:28.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:28.142000 audit: BPF prog-id=23 op=LOAD Dec 13 14:24:28.143444 systemd[1]: Starting systemd-networkd.service... Dec 13 14:24:28.168000 audit: BPF prog-id=24 op=LOAD Dec 13 14:24:28.168000 audit: BPF prog-id=25 op=LOAD Dec 13 14:24:28.168000 audit: BPF prog-id=26 op=LOAD Dec 13 14:24:28.170126 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:24:28.237499 systemd[1]: Started systemd-userdbd.service. Dec 13 14:24:28.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:28.244688 (udev-worker)[1285]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:24:28.262429 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:24:28.401658 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:24:28.408824 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:24:28.408931 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 14:24:28.417554 systemd-networkd[1288]: lo: Link UP Dec 13 14:24:28.417912 systemd-networkd[1288]: lo: Gained carrier Dec 13 14:24:28.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:28.418569 systemd-networkd[1288]: Enumeration completed Dec 13 14:24:28.418698 systemd[1]: Started systemd-networkd.service. Dec 13 14:24:28.423151 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:24:28.418000 audit[1297]: AVC avc: denied { confidentiality } for pid=1297 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:24:28.424894 systemd-networkd[1288]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:24:28.429248 systemd-networkd[1288]: eth0: Link UP Dec 13 14:24:28.429616 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:24:28.429857 systemd-networkd[1288]: eth0: Gained carrier Dec 13 14:24:28.431598 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:24:28.438757 systemd-networkd[1288]: eth0: DHCPv4 address 172.31.28.110/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:24:28.418000 audit[1297]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558f40ae7860 a1=337fc a2=7fb07d631bc5 a3=5 items=110 ppid=1283 pid=1297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:28.418000 audit: CWD cwd="/" Dec 13 14:24:28.418000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=1 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=2 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=3 name=(null) inode=14085 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=4 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=5 name=(null) inode=14086 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=6 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=7 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=8 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=9 name=(null) inode=14088 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=10 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=11 name=(null) inode=14089 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=12 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=13 name=(null) inode=14090 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=14 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=15 name=(null) inode=14091 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=16 name=(null) inode=14087 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=17 name=(null) inode=14092 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=18 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=19 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=20 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=21 name=(null) inode=14094 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=22 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=23 name=(null) inode=14095 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=24 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=25 name=(null) inode=14096 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=26 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=27 name=(null) inode=14097 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=28 name=(null) inode=14093 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=29 name=(null) inode=14098 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=30 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=31 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=32 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=33 name=(null) inode=14100 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=34 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=35 name=(null) inode=14101 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=36 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=37 name=(null) inode=14102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=38 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=39 name=(null) inode=14103 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=40 name=(null) inode=14099 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=41 name=(null) inode=14104 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=42 name=(null) inode=14084 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=43 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=44 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=45 name=(null) inode=14106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=46 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=47 name=(null) inode=14107 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=48 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=49 name=(null) inode=14108 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=50 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=51 name=(null) inode=14109 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=52 name=(null) inode=14105 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=53 name=(null) inode=14110 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=55 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=56 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=57 name=(null) inode=14112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=58 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=59 name=(null) inode=14113 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=60 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=61 name=(null) inode=14114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=62 name=(null) inode=14114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=63 name=(null) inode=14115 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=64 name=(null) inode=14114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=65 name=(null) inode=14116 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=66 name=(null) inode=14114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=67 name=(null) inode=14117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=68 name=(null) inode=14114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=69 name=(null) inode=14118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=70 name=(null) inode=14114 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=71 name=(null) inode=14119 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=72 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=73 name=(null) inode=14120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=74 name=(null) inode=14120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=75 name=(null) inode=14121 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=76 name=(null) inode=14120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=77 name=(null) inode=14122 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=78 name=(null) inode=14120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=79 name=(null) inode=14123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=80 name=(null) inode=14120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=81 name=(null) inode=14124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=82 name=(null) inode=14120 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=83 name=(null) inode=14125 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=84 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=85 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=86 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=87 name=(null) inode=14127 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=88 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=89 name=(null) inode=14128 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=90 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=91 name=(null) inode=14129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=92 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=93 name=(null) inode=14130 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=94 name=(null) inode=14126 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=95 name=(null) inode=14131 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=96 name=(null) inode=14111 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=97 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=98 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=99 name=(null) inode=14133 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=100 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=101 name=(null) inode=14134 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=102 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=103 name=(null) inode=14135 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=104 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=105 name=(null) inode=14136 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=106 name=(null) inode=14132 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=107 name=(null) inode=14137 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PATH item=109 name=(null) inode=14143 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:24:28.418000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:24:28.483583 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Dec 13 14:24:28.507565 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1293) Dec 13 14:24:28.520571 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 14:24:28.563560 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:24:28.640393 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:24:28.743072 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:24:28.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:28.747313 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:24:28.826747 lvm[1397]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:24:28.857883 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:24:28.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:28.859267 systemd[1]: Reached target cryptsetup.target. Dec 13 14:24:28.861908 systemd[1]: Starting lvm2-activation.service... Dec 13 14:24:28.869660 lvm[1398]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:24:28.900903 systemd[1]: Finished lvm2-activation.service. Dec 13 14:24:28.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:28.902370 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:24:28.903660 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:24:28.903709 systemd[1]: Reached target local-fs.target. Dec 13 14:24:28.905044 systemd[1]: Reached target machines.target. Dec 13 14:24:28.908394 systemd[1]: Starting ldconfig.service... Dec 13 14:24:28.911669 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:24:28.911760 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:28.913862 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:24:28.916961 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:24:28.920103 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:24:28.923834 systemd[1]: Starting systemd-sysext.service... Dec 13 14:24:28.934851 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1400 (bootctl) Dec 13 14:24:28.937953 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:24:28.969473 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:24:28.975208 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:24:28.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:28.986369 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:24:28.987487 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:24:29.003679 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:24:29.137816 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:24:29.139645 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:24:29.140183 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:24:29.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.160998 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:24:29.182346 (sd-sysext)[1413]: Using extensions 'kubernetes'. Dec 13 14:24:29.185903 (sd-sysext)[1413]: Merged extensions into '/usr'. Dec 13 14:24:29.216405 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:29.221420 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:24:29.222433 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:24:29.226940 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:24:29.232673 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:24:29.235032 systemd[1]: Starting modprobe@loop.service... Dec 13 14:24:29.235379 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:24:29.235568 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:29.235756 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:29.238351 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:24:29.239468 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:24:29.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.242805 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:24:29.244210 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:24:29.245195 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:24:29.245365 systemd[1]: Finished modprobe@loop.service. Dec 13 14:24:29.246378 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:24:29.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.247296 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:24:29.250904 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:24:29.253580 systemd[1]: Finished systemd-sysext.service. Dec 13 14:24:29.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.258322 systemd[1]: Starting ensure-sysext.service... Dec 13 14:24:29.261140 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:24:29.285893 systemd[1]: Reloading. Dec 13 14:24:29.291593 systemd-fsck[1410]: fsck.fat 4.2 (2021-01-31) Dec 13 14:24:29.291593 systemd-fsck[1410]: /dev/nvme0n1p1: 789 files, 119291/258078 clusters Dec 13 14:24:29.340629 systemd-tmpfiles[1420]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:24:29.378397 systemd-tmpfiles[1420]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:24:29.407815 systemd-tmpfiles[1420]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:24:29.422888 /usr/lib/systemd/system-generators/torcx-generator[1450]: time="2024-12-13T14:24:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:24:29.422925 /usr/lib/systemd/system-generators/torcx-generator[1450]: time="2024-12-13T14:24:29Z" level=info msg="torcx already run" Dec 13 14:24:29.677477 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:24:29.677502 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:24:29.700872 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:24:29.781000 audit: BPF prog-id=27 op=LOAD Dec 13 14:24:29.781000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:24:29.781000 audit: BPF prog-id=28 op=LOAD Dec 13 14:24:29.781000 audit: BPF prog-id=29 op=LOAD Dec 13 14:24:29.781000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:24:29.781000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:24:29.786000 audit: BPF prog-id=30 op=LOAD Dec 13 14:24:29.786000 audit: BPF prog-id=31 op=LOAD Dec 13 14:24:29.786000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:24:29.786000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:24:29.786000 audit: BPF prog-id=32 op=LOAD Dec 13 14:24:29.787000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:24:29.787000 audit: BPF prog-id=33 op=LOAD Dec 13 14:24:29.787000 audit: BPF prog-id=34 op=LOAD Dec 13 14:24:29.787000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:24:29.787000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:24:29.788000 audit: BPF prog-id=35 op=LOAD Dec 13 14:24:29.788000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:24:29.792515 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:24:29.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.811124 systemd[1]: Mounting boot.mount... Dec 13 14:24:29.828448 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:29.829324 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:24:29.843353 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:24:29.847803 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:24:29.851800 systemd[1]: Starting modprobe@loop.service... Dec 13 14:24:29.853471 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:24:29.853993 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:29.854487 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:29.858459 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:24:29.858989 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:24:29.861088 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:24:29.861331 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:24:29.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.865796 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:24:29.866131 systemd[1]: Finished modprobe@loop.service. Dec 13 14:24:29.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.871235 systemd[1]: Mounted boot.mount. Dec 13 14:24:29.876508 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:24:29.879573 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:24:29.885678 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:24:29.891992 systemd[1]: Starting modprobe@loop.service... Dec 13 14:24:29.893202 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:24:29.893412 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:29.895787 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:24:29.896240 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:24:29.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.898340 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:24:29.898937 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:24:29.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.901028 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:24:29.906225 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:24:29.906615 systemd[1]: Finished modprobe@loop.service. Dec 13 14:24:29.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.910804 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:24:29.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.916029 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:24:29.918107 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:24:29.922703 systemd[1]: Starting modprobe@drm.service... Dec 13 14:24:29.928820 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:24:29.930019 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:24:29.930111 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:29.931273 systemd[1]: Finished ensure-sysext.service. Dec 13 14:24:29.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.933088 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:24:29.933266 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:24:29.935301 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:24:29.935536 systemd[1]: Finished modprobe@drm.service. Dec 13 14:24:29.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.938341 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:24:29.938504 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:24:29.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.940084 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:24:29.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:29.940140 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:24:29.984275 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:29.984370 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:30.004946 systemd-networkd[1288]: eth0: Gained IPv6LL Dec 13 14:24:30.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:30.009924 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:24:30.059585 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:24:30.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:30.063971 systemd[1]: Starting audit-rules.service... Dec 13 14:24:30.077534 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:24:30.081044 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:24:30.083000 audit: BPF prog-id=36 op=LOAD Dec 13 14:24:30.085233 systemd[1]: Starting systemd-resolved.service... Dec 13 14:24:30.087000 audit: BPF prog-id=37 op=LOAD Dec 13 14:24:30.089395 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:24:30.096973 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:24:30.122790 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:24:30.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:30.124442 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:24:30.129000 audit[1520]: SYSTEM_BOOT pid=1520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:24:30.133985 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:24:30.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:30.233470 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:24:30.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:30.272079 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:24:30.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:30.273327 systemd[1]: Reached target time-set.target. Dec 13 14:24:30.283000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:24:30.283000 audit[1535]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbd9d05f0 a2=420 a3=0 items=0 ppid=1514 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:30.283000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:24:30.285657 augenrules[1535]: No rules Dec 13 14:24:30.286488 systemd[1]: Finished audit-rules.service. Dec 13 14:24:30.315475 systemd-resolved[1517]: Positive Trust Anchors: Dec 13 14:24:30.315493 systemd-resolved[1517]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:24:30.315533 systemd-resolved[1517]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:24:31.769984 systemd-timesyncd[1519]: Contacted time server 99.28.14.242:123 (0.flatcar.pool.ntp.org). Dec 13 14:24:31.770250 systemd-timesyncd[1519]: Initial clock synchronization to Fri 2024-12-13 14:24:31.769753 UTC. Dec 13 14:24:31.783398 systemd-resolved[1517]: Defaulting to hostname 'linux'. Dec 13 14:24:31.786380 systemd[1]: Started systemd-resolved.service. Dec 13 14:24:31.790123 systemd[1]: Reached target network.target. Dec 13 14:24:31.792489 systemd[1]: Reached target network-online.target. Dec 13 14:24:31.794026 systemd[1]: Reached target nss-lookup.target. Dec 13 14:24:31.998067 ldconfig[1399]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:24:32.004586 systemd[1]: Finished ldconfig.service. Dec 13 14:24:32.018736 systemd[1]: Starting systemd-update-done.service... Dec 13 14:24:32.046387 systemd[1]: Finished systemd-update-done.service. Dec 13 14:24:32.051508 systemd[1]: Reached target sysinit.target. Dec 13 14:24:32.052708 systemd[1]: Started motdgen.path. Dec 13 14:24:32.053772 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:24:32.055511 systemd[1]: Started logrotate.timer. Dec 13 14:24:32.057136 systemd[1]: Started mdadm.timer. Dec 13 14:24:32.059543 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:24:32.061332 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:24:32.061371 systemd[1]: Reached target paths.target. Dec 13 14:24:32.062545 systemd[1]: Reached target timers.target. Dec 13 14:24:32.065025 systemd[1]: Listening on dbus.socket. Dec 13 14:24:32.067985 systemd[1]: Starting docker.socket... Dec 13 14:24:32.072308 systemd[1]: Listening on sshd.socket. Dec 13 14:24:32.073368 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:32.073950 systemd[1]: Listening on docker.socket. Dec 13 14:24:32.075065 systemd[1]: Reached target sockets.target. Dec 13 14:24:32.076425 systemd[1]: Reached target basic.target. Dec 13 14:24:32.077419 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:24:32.077448 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:24:32.079577 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:24:32.082738 systemd[1]: Starting containerd.service... Dec 13 14:24:32.085426 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:24:32.089347 systemd[1]: Starting dbus.service... Dec 13 14:24:32.095309 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:24:32.101967 systemd[1]: Starting extend-filesystems.service... Dec 13 14:24:32.102935 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:24:32.105102 systemd[1]: Starting kubelet.service... Dec 13 14:24:32.107554 systemd[1]: Starting motdgen.service... Dec 13 14:24:32.109649 systemd[1]: Started nvidia.service. Dec 13 14:24:32.123956 systemd[1]: Starting prepare-helm.service... Dec 13 14:24:32.128713 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:24:32.133116 systemd[1]: Starting sshd-keygen.service... Dec 13 14:24:32.145162 systemd[1]: Starting systemd-logind.service... Dec 13 14:24:32.147593 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:24:32.147708 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:24:32.150773 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:24:32.254194 jq[1547]: false Dec 13 14:24:32.152047 systemd[1]: Starting update-engine.service... Dec 13 14:24:32.155888 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:24:32.230362 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:24:32.230572 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:24:32.246756 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:24:32.247007 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:24:32.335730 jq[1558]: true Dec 13 14:24:32.376382 tar[1561]: linux-amd64/helm Dec 13 14:24:32.492145 extend-filesystems[1549]: Found loop1 Dec 13 14:24:32.495195 extend-filesystems[1549]: Found nvme0n1 Dec 13 14:24:32.496765 extend-filesystems[1549]: Found nvme0n1p1 Dec 13 14:24:32.496765 extend-filesystems[1549]: Found nvme0n1p2 Dec 13 14:24:32.496765 extend-filesystems[1549]: Found nvme0n1p3 Dec 13 14:24:32.496765 extend-filesystems[1549]: Found usr Dec 13 14:24:32.496765 extend-filesystems[1549]: Found nvme0n1p4 Dec 13 14:24:32.496765 extend-filesystems[1549]: Found nvme0n1p6 Dec 13 14:24:32.496765 extend-filesystems[1549]: Found nvme0n1p7 Dec 13 14:24:32.496765 extend-filesystems[1549]: Found nvme0n1p9 Dec 13 14:24:32.496765 extend-filesystems[1549]: Checking size of /dev/nvme0n1p9 Dec 13 14:24:32.509577 jq[1581]: true Dec 13 14:24:32.522260 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:24:32.522493 systemd[1]: Finished motdgen.service. Dec 13 14:24:32.536317 dbus-daemon[1546]: [system] SELinux support is enabled Dec 13 14:24:32.541966 systemd[1]: Started dbus.service. Dec 13 14:24:32.546127 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:24:32.546186 systemd[1]: Reached target system-config.target. Dec 13 14:24:32.547606 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:24:32.547723 systemd[1]: Reached target user-config.target. Dec 13 14:24:32.555019 amazon-ssm-agent[1543]: 2024/12/13 14:24:32 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:24:32.556717 amazon-ssm-agent[1543]: Initializing new seelog logger Dec 13 14:24:32.565543 amazon-ssm-agent[1543]: New Seelog Logger Creation Complete Dec 13 14:24:32.565789 amazon-ssm-agent[1543]: 2024/12/13 14:24:32 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:24:32.565916 amazon-ssm-agent[1543]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:24:32.566343 amazon-ssm-agent[1543]: 2024/12/13 14:24:32 processing appconfig overrides Dec 13 14:24:32.598767 extend-filesystems[1549]: Resized partition /dev/nvme0n1p9 Dec 13 14:24:32.618407 dbus-daemon[1546]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1288 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:24:32.625094 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:24:32.637937 extend-filesystems[1612]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:24:32.655649 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:24:32.727848 update_engine[1557]: I1213 14:24:32.726241 1557 main.cc:92] Flatcar Update Engine starting Dec 13 14:24:32.781722 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:24:32.765546 systemd[1]: Started update-engine.service. Dec 13 14:24:32.782282 env[1563]: time="2024-12-13T14:24:32.771631371Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:24:32.782534 update_engine[1557]: I1213 14:24:32.765966 1557 update_check_scheduler.cc:74] Next update check in 8m26s Dec 13 14:24:32.770109 systemd[1]: Started locksmithd.service. Dec 13 14:24:32.788101 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:24:32.789275 extend-filesystems[1612]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:24:32.789275 extend-filesystems[1612]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:24:32.789275 extend-filesystems[1612]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:24:32.788410 systemd[1]: Finished extend-filesystems.service. Dec 13 14:24:32.821484 bash[1617]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:24:32.821703 extend-filesystems[1549]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:24:32.792529 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:24:32.801502 systemd-logind[1556]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:24:32.801525 systemd-logind[1556]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:24:32.801550 systemd-logind[1556]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:24:32.824133 systemd-logind[1556]: New seat seat0. Dec 13 14:24:32.835847 systemd[1]: Started systemd-logind.service. Dec 13 14:24:32.908763 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:24:33.000993 env[1563]: time="2024-12-13T14:24:33.000909535Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:24:33.016936 dbus-daemon[1546]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:24:33.017113 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:24:33.017969 dbus-daemon[1546]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1616 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:24:33.018343 env[1563]: time="2024-12-13T14:24:33.018309123Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:33.023762 systemd[1]: Starting polkit.service... Dec 13 14:24:33.028931 env[1563]: time="2024-12-13T14:24:33.028876278Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:24:33.029046 env[1563]: time="2024-12-13T14:24:33.028937845Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:33.032005 env[1563]: time="2024-12-13T14:24:33.031857621Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:24:33.032005 env[1563]: time="2024-12-13T14:24:33.031967363Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:33.032005 env[1563]: time="2024-12-13T14:24:33.031989745Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:24:33.032005 env[1563]: time="2024-12-13T14:24:33.032004340Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:33.032239 env[1563]: time="2024-12-13T14:24:33.032160174Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:33.032556 env[1563]: time="2024-12-13T14:24:33.032527470Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:33.033039 env[1563]: time="2024-12-13T14:24:33.032818483Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:24:33.033039 env[1563]: time="2024-12-13T14:24:33.032850055Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:24:33.033039 env[1563]: time="2024-12-13T14:24:33.032922931Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:24:33.033039 env[1563]: time="2024-12-13T14:24:33.032943338Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:24:33.059526 polkitd[1649]: Started polkitd version 121 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064292833Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064377429Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064415351Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064577382Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064617002Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064638190Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064729324Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064753400Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064774079Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064811414Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064833932Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.064854184Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.065042828Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:24:33.065419 env[1563]: time="2024-12-13T14:24:33.065156644Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:24:33.066179 env[1563]: time="2024-12-13T14:24:33.065739070Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:24:33.066179 env[1563]: time="2024-12-13T14:24:33.065799483Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066179 env[1563]: time="2024-12-13T14:24:33.065822059Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:24:33.066179 env[1563]: time="2024-12-13T14:24:33.065900695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066179 env[1563]: time="2024-12-13T14:24:33.066073857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066179 env[1563]: time="2024-12-13T14:24:33.066123329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066179 env[1563]: time="2024-12-13T14:24:33.066177371Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066460 env[1563]: time="2024-12-13T14:24:33.066198866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066460 env[1563]: time="2024-12-13T14:24:33.066238182Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066460 env[1563]: time="2024-12-13T14:24:33.066259580Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066460 env[1563]: time="2024-12-13T14:24:33.066278830Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066460 env[1563]: time="2024-12-13T14:24:33.066317069Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:24:33.066764 env[1563]: time="2024-12-13T14:24:33.066526699Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066764 env[1563]: time="2024-12-13T14:24:33.066675767Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066764 env[1563]: time="2024-12-13T14:24:33.066711938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.066764 env[1563]: time="2024-12-13T14:24:33.066748718Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:24:33.066925 env[1563]: time="2024-12-13T14:24:33.066780306Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:24:33.066925 env[1563]: time="2024-12-13T14:24:33.066799572Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:24:33.066925 env[1563]: time="2024-12-13T14:24:33.066844736Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:24:33.066925 env[1563]: time="2024-12-13T14:24:33.066911777Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:24:33.067356 env[1563]: time="2024-12-13T14:24:33.067263408Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:24:33.070346 env[1563]: time="2024-12-13T14:24:33.067382962Z" level=info msg="Connect containerd service" Dec 13 14:24:33.070346 env[1563]: time="2024-12-13T14:24:33.067445077Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:24:33.072231 env[1563]: time="2024-12-13T14:24:33.071069360Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:24:33.072231 env[1563]: time="2024-12-13T14:24:33.071214200Z" level=info msg="Start subscribing containerd event" Dec 13 14:24:33.072231 env[1563]: time="2024-12-13T14:24:33.071267858Z" level=info msg="Start recovering state" Dec 13 14:24:33.072231 env[1563]: time="2024-12-13T14:24:33.071344746Z" level=info msg="Start event monitor" Dec 13 14:24:33.072231 env[1563]: time="2024-12-13T14:24:33.071370771Z" level=info msg="Start snapshots syncer" Dec 13 14:24:33.072231 env[1563]: time="2024-12-13T14:24:33.071384268Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:24:33.072231 env[1563]: time="2024-12-13T14:24:33.071394902Z" level=info msg="Start streaming server" Dec 13 14:24:33.072231 env[1563]: time="2024-12-13T14:24:33.071973435Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:24:33.072231 env[1563]: time="2024-12-13T14:24:33.072023921Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:24:33.072164 systemd[1]: Started containerd.service. Dec 13 14:24:33.074432 env[1563]: time="2024-12-13T14:24:33.072803235Z" level=info msg="containerd successfully booted in 0.384862s" Dec 13 14:24:33.093491 polkitd[1649]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:24:33.093578 polkitd[1649]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:24:33.096481 polkitd[1649]: Finished loading, compiling and executing 2 rules Dec 13 14:24:33.097352 dbus-daemon[1546]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:24:33.097546 systemd[1]: Started polkit.service. Dec 13 14:24:33.098205 polkitd[1649]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:24:33.123173 systemd-hostnamed[1616]: Hostname set to (transient) Dec 13 14:24:33.123174 systemd-resolved[1517]: System hostname changed to 'ip-172-31-28-110'. Dec 13 14:24:33.367889 coreos-metadata[1545]: Dec 13 14:24:33.367 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:24:33.376469 coreos-metadata[1545]: Dec 13 14:24:33.371 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:24:33.379088 coreos-metadata[1545]: Dec 13 14:24:33.378 INFO Fetch successful Dec 13 14:24:33.379521 coreos-metadata[1545]: Dec 13 14:24:33.379 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:24:33.387399 coreos-metadata[1545]: Dec 13 14:24:33.387 INFO Fetch successful Dec 13 14:24:33.400334 unknown[1545]: wrote ssh authorized keys file for user: core Dec 13 14:24:33.432334 update-ssh-keys[1711]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:24:33.434462 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:24:33.544365 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Create new startup processor Dec 13 14:24:33.548614 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:24:33.550655 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Initializing bookkeeping folders Dec 13 14:24:33.550824 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO removing the completed state files Dec 13 14:24:33.550926 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:24:33.551037 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:24:33.551128 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Initializing healthcheck folders for long running plugins Dec 13 14:24:33.551216 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Initializing locations for inventory plugin Dec 13 14:24:33.551309 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Initializing default location for custom inventory Dec 13 14:24:33.551410 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Initializing default location for file inventory Dec 13 14:24:33.551499 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Initializing default location for role inventory Dec 13 14:24:33.551590 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Init the cloudwatchlogs publisher Dec 13 14:24:33.551677 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:24:33.551946 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:24:33.552038 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:24:33.567139 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:24:33.567139 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:24:33.567569 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:24:33.567569 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:24:33.567569 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:24:33.567569 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:24:33.567569 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:24:33.567569 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:24:33.567569 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO OS: linux, Arch: amd64 Dec 13 14:24:33.569941 amazon-ssm-agent[1543]: datastore file /var/lib/amazon/ssm/i-0e1e1bcf72cd05a9e/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:24:33.577997 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:24:33.676896 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:24:33.771450 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:24:33.865965 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:24:33.961669 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:24:34.056493 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [instanceID=i-0e1e1bcf72cd05a9e] Starting association polling Dec 13 14:24:34.151623 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:24:34.247283 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:24:34.282343 sshd_keygen[1586]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:24:34.342711 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:24:34.360472 tar[1561]: linux-amd64/LICENSE Dec 13 14:24:34.361117 tar[1561]: linux-amd64/README.md Dec 13 14:24:34.367240 systemd[1]: Finished sshd-keygen.service. Dec 13 14:24:34.371096 systemd[1]: Starting issuegen.service... Dec 13 14:24:34.372338 systemd[1]: Finished prepare-helm.service. Dec 13 14:24:34.383453 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:24:34.383680 systemd[1]: Finished issuegen.service. Dec 13 14:24:34.386822 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:24:34.398506 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:24:34.401639 systemd[1]: Started getty@tty1.service. Dec 13 14:24:34.405067 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:24:34.407169 systemd[1]: Reached target getty.target. Dec 13 14:24:34.438593 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:24:34.469033 locksmithd[1627]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:24:34.534371 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:24:34.630425 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:24:34.727329 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:24:34.824833 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:24:34.832185 systemd[1]: Started kubelet.service. Dec 13 14:24:34.838238 systemd[1]: Reached target multi-user.target. Dec 13 14:24:34.847786 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:24:34.870186 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:24:34.870864 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:24:34.873223 systemd[1]: Startup finished in 896ms (kernel) + 8.827s (initrd) + 12.741s (userspace) = 22.466s. Dec 13 14:24:34.921532 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0e1e1bcf72cd05a9e, requestId: cd5e6a48-128e-4f05-9045-c86dbbeebb93 Dec 13 14:24:35.018412 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [OfflineService] Starting document processing engine... Dec 13 14:24:35.115462 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:24:35.213147 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:24:35.311208 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [OfflineService] Starting message polling Dec 13 14:24:35.408924 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [OfflineService] Starting send replies to MDS Dec 13 14:24:35.510331 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:24:35.608461 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:24:35.706991 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:24:35.805401 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessageGatewayService] listening reply. Dec 13 14:24:35.904049 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:24:36.002937 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:24:36.102019 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:24:36.183250 kubelet[1769]: E1213 14:24:36.183174 1769 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:24:36.186414 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:24:36.186594 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:24:36.186906 systemd[1]: kubelet.service: Consumed 1.167s CPU time. Dec 13 14:24:36.201277 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:24:36.300964 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:24:36.400635 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0e1e1bcf72cd05a9e?role=subscribe&stream=input Dec 13 14:24:36.500477 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0e1e1bcf72cd05a9e?role=subscribe&stream=input Dec 13 14:24:36.600697 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:24:36.700928 amazon-ssm-agent[1543]: 2024-12-13 14:24:33 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:24:40.443947 systemd[1]: Created slice system-sshd.slice. Dec 13 14:24:40.447914 systemd[1]: Started sshd@0-172.31.28.110:22-139.178.89.65:51012.service. Dec 13 14:24:40.701547 sshd[1777]: Accepted publickey for core from 139.178.89.65 port 51012 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:24:40.704913 sshd[1777]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:40.724577 systemd[1]: Created slice user-500.slice. Dec 13 14:24:40.728923 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:24:40.742899 systemd-logind[1556]: New session 1 of user core. Dec 13 14:24:40.758340 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:24:40.766657 systemd[1]: Starting user@500.service... Dec 13 14:24:40.771399 (systemd)[1780]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:40.880159 systemd[1780]: Queued start job for default target default.target. Dec 13 14:24:40.880865 systemd[1780]: Reached target paths.target. Dec 13 14:24:40.880896 systemd[1780]: Reached target sockets.target. Dec 13 14:24:40.880915 systemd[1780]: Reached target timers.target. Dec 13 14:24:40.880931 systemd[1780]: Reached target basic.target. Dec 13 14:24:40.881057 systemd[1]: Started user@500.service. Dec 13 14:24:40.882342 systemd[1]: Started session-1.scope. Dec 13 14:24:40.884844 systemd[1780]: Reached target default.target. Dec 13 14:24:40.885117 systemd[1780]: Startup finished in 105ms. Dec 13 14:24:41.037846 systemd[1]: Started sshd@1-172.31.28.110:22-139.178.89.65:51016.service. Dec 13 14:24:41.208944 sshd[1789]: Accepted publickey for core from 139.178.89.65 port 51016 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:24:41.212445 sshd[1789]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:41.219782 systemd-logind[1556]: New session 2 of user core. Dec 13 14:24:41.222274 systemd[1]: Started session-2.scope. Dec 13 14:24:41.353433 sshd[1789]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:41.357909 systemd[1]: sshd@1-172.31.28.110:22-139.178.89.65:51016.service: Deactivated successfully. Dec 13 14:24:41.358932 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:24:41.360153 systemd-logind[1556]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:24:41.361837 systemd-logind[1556]: Removed session 2. Dec 13 14:24:41.389135 systemd[1]: Started sshd@2-172.31.28.110:22-139.178.89.65:51026.service. Dec 13 14:24:41.579810 sshd[1795]: Accepted publickey for core from 139.178.89.65 port 51026 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:24:41.581447 sshd[1795]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:41.593860 systemd-logind[1556]: New session 3 of user core. Dec 13 14:24:41.594486 systemd[1]: Started session-3.scope. Dec 13 14:24:41.718719 sshd[1795]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:41.723474 systemd[1]: sshd@2-172.31.28.110:22-139.178.89.65:51026.service: Deactivated successfully. Dec 13 14:24:41.726524 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:24:41.730372 systemd-logind[1556]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:24:41.739995 systemd-logind[1556]: Removed session 3. Dec 13 14:24:41.754701 systemd[1]: Started sshd@3-172.31.28.110:22-139.178.89.65:51036.service. Dec 13 14:24:41.924027 sshd[1801]: Accepted publickey for core from 139.178.89.65 port 51036 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:24:41.925840 sshd[1801]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:41.932805 systemd-logind[1556]: New session 4 of user core. Dec 13 14:24:41.933606 systemd[1]: Started session-4.scope. Dec 13 14:24:42.067207 sshd[1801]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:42.071867 systemd[1]: sshd@3-172.31.28.110:22-139.178.89.65:51036.service: Deactivated successfully. Dec 13 14:24:42.072946 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:24:42.075263 systemd-logind[1556]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:24:42.076947 systemd-logind[1556]: Removed session 4. Dec 13 14:24:42.107476 systemd[1]: Started sshd@4-172.31.28.110:22-139.178.89.65:51048.service. Dec 13 14:24:42.287573 sshd[1807]: Accepted publickey for core from 139.178.89.65 port 51048 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:24:42.292264 sshd[1807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:42.322229 systemd[1]: Started session-5.scope. Dec 13 14:24:42.322866 systemd-logind[1556]: New session 5 of user core. Dec 13 14:24:42.517276 sudo[1810]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:24:42.517620 sudo[1810]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:24:42.528961 dbus-daemon[1546]: \xd0-\xbcɻU: received setenforce notice (enforcing=-1746745872) Dec 13 14:24:42.531242 sudo[1810]: pam_unix(sudo:session): session closed for user root Dec 13 14:24:42.556851 sshd[1807]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:42.562379 systemd[1]: sshd@4-172.31.28.110:22-139.178.89.65:51048.service: Deactivated successfully. Dec 13 14:24:42.563919 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:24:42.564694 systemd-logind[1556]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:24:42.566044 systemd-logind[1556]: Removed session 5. Dec 13 14:24:42.587169 systemd[1]: Started sshd@5-172.31.28.110:22-139.178.89.65:51060.service. Dec 13 14:24:42.779411 sshd[1815]: Accepted publickey for core from 139.178.89.65 port 51060 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:24:42.781262 sshd[1815]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:42.789492 systemd[1]: Started session-6.scope. Dec 13 14:24:42.790465 systemd-logind[1556]: New session 6 of user core. Dec 13 14:24:42.895306 sudo[1819]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:24:42.898760 sudo[1819]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:24:42.919711 sudo[1819]: pam_unix(sudo:session): session closed for user root Dec 13 14:24:42.942930 sudo[1818]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:24:42.943316 sudo[1818]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:24:42.965993 systemd[1]: Stopping audit-rules.service... Dec 13 14:24:42.966000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:24:42.969692 kernel: kauditd_printk_skb: 233 callbacks suppressed Dec 13 14:24:42.969772 kernel: audit: type=1305 audit(1734099882.966:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:24:42.970958 auditctl[1822]: No rules Dec 13 14:24:42.966000 audit[1822]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd60b73320 a2=420 a3=0 items=0 ppid=1 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.979407 kernel: audit: type=1300 audit(1734099882.966:213): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd60b73320 a2=420 a3=0 items=0 ppid=1 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:42.979498 kernel: audit: type=1327 audit(1734099882.966:213): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:24:42.966000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:24:42.973354 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:24:42.973579 systemd[1]: Stopped audit-rules.service. Dec 13 14:24:42.979125 systemd[1]: Starting audit-rules.service... Dec 13 14:24:42.982089 kernel: audit: type=1131 audit(1734099882.971:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:42.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.017288 augenrules[1839]: No rules Dec 13 14:24:43.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.018274 systemd[1]: Finished audit-rules.service. Dec 13 14:24:43.027803 kernel: audit: type=1130 audit(1734099883.016:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.028789 kernel: audit: type=1106 audit(1734099883.024:216): pid=1818 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.024000 audit[1818]: USER_END pid=1818 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.025812 sudo[1818]: pam_unix(sudo:session): session closed for user root Dec 13 14:24:43.035716 kernel: audit: type=1104 audit(1734099883.025:217): pid=1818 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.025000 audit[1818]: CRED_DISP pid=1818 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.052987 sshd[1815]: pam_unix(sshd:session): session closed for user core Dec 13 14:24:43.053000 audit[1815]: USER_END pid=1815 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:24:43.065249 systemd[1]: sshd@5-172.31.28.110:22-139.178.89.65:51060.service: Deactivated successfully. Dec 13 14:24:43.065869 kernel: audit: type=1106 audit(1734099883.053:218): pid=1815 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:24:43.053000 audit[1815]: CRED_DISP pid=1815 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:24:43.066656 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:24:43.068320 systemd-logind[1556]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:24:43.070010 systemd-logind[1556]: Removed session 6. Dec 13 14:24:43.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.28.110:22-139.178.89.65:51060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.079962 kernel: audit: type=1104 audit(1734099883.053:219): pid=1815 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:24:43.080078 kernel: audit: type=1131 audit(1734099883.064:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.28.110:22-139.178.89.65:51060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.110:22-139.178.89.65:51072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.086012 systemd[1]: Started sshd@6-172.31.28.110:22-139.178.89.65:51072.service. Dec 13 14:24:43.252000 audit[1845]: USER_ACCT pid=1845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:24:43.254000 audit[1845]: CRED_ACQ pid=1845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:24:43.254000 audit[1845]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6532daa0 a2=3 a3=0 items=0 ppid=1 pid=1845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.254000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:24:43.256458 sshd[1845]: Accepted publickey for core from 139.178.89.65 port 51072 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:24:43.256553 sshd[1845]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:43.270528 systemd-logind[1556]: New session 7 of user core. Dec 13 14:24:43.271016 systemd[1]: Started session-7.scope. Dec 13 14:24:43.301000 audit[1845]: USER_START pid=1845 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:24:43.313000 audit[1847]: CRED_ACQ pid=1847 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:24:43.413000 audit[1848]: USER_ACCT pid=1848 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.415335 sudo[1848]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:24:43.413000 audit[1848]: CRED_REFR pid=1848 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.415734 sudo[1848]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:24:43.416000 audit[1848]: USER_START pid=1848 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:24:43.447735 systemd[1]: Starting docker.service... Dec 13 14:24:43.495203 env[1858]: time="2024-12-13T14:24:43.495147218Z" level=info msg="Starting up" Dec 13 14:24:43.499533 env[1858]: time="2024-12-13T14:24:43.499497704Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:24:43.499817 env[1858]: time="2024-12-13T14:24:43.499686742Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:24:43.499937 env[1858]: time="2024-12-13T14:24:43.499917973Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:24:43.500017 env[1858]: time="2024-12-13T14:24:43.500004560Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:24:43.503348 env[1858]: time="2024-12-13T14:24:43.503319572Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:24:43.503506 env[1858]: time="2024-12-13T14:24:43.503491173Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:24:43.503570 env[1858]: time="2024-12-13T14:24:43.503559844Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:24:43.503612 env[1858]: time="2024-12-13T14:24:43.503604971Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:24:43.511447 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport200951143-merged.mount: Deactivated successfully. Dec 13 14:24:43.543009 env[1858]: time="2024-12-13T14:24:43.542949002Z" level=info msg="Loading containers: start." Dec 13 14:24:43.683000 audit[1888]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.683000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc5e91b480 a2=0 a3=7ffc5e91b46c items=0 ppid=1858 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.683000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:24:43.686000 audit[1890]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.686000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff2e8fb170 a2=0 a3=7fff2e8fb15c items=0 ppid=1858 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.686000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:24:43.688000 audit[1892]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.688000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffddde9b830 a2=0 a3=7ffddde9b81c items=0 ppid=1858 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:24:43.690000 audit[1894]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.690000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc30ee70e0 a2=0 a3=7ffc30ee70cc items=0 ppid=1858 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.690000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:24:43.702000 audit[1896]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.702000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeb91b08b0 a2=0 a3=7ffeb91b089c items=0 ppid=1858 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.702000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:24:43.724000 audit[1901]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.724000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc34817200 a2=0 a3=7ffc348171ec items=0 ppid=1858 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.724000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:24:43.736000 audit[1903]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.736000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc87c80ce0 a2=0 a3=7ffc87c80ccc items=0 ppid=1858 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.736000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:24:43.738000 audit[1905]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.738000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffa3682050 a2=0 a3=7fffa368203c items=0 ppid=1858 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.738000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:24:43.741000 audit[1907]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.741000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffded4392f0 a2=0 a3=7ffded4392dc items=0 ppid=1858 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.741000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:24:43.754000 audit[1911]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.754000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff3a6b7220 a2=0 a3=7fff3a6b720c items=0 ppid=1858 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.754000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:24:43.761000 audit[1912]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.761000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcfc001140 a2=0 a3=7ffcfc00112c items=0 ppid=1858 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.761000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:24:43.806748 kernel: Initializing XFRM netlink socket Dec 13 14:24:43.913763 env[1858]: time="2024-12-13T14:24:43.913716422Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:24:43.915002 (udev-worker)[1868]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:24:43.968000 audit[1920]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:43.968000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe15dbd760 a2=0 a3=7ffe15dbd74c items=0 ppid=1858 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:43.968000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:24:44.091000 audit[1923]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.091000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffeac42c8e0 a2=0 a3=7ffeac42c8cc items=0 ppid=1858 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.091000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:24:44.095000 audit[1926]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.095000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffff62ca860 a2=0 a3=7ffff62ca84c items=0 ppid=1858 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.095000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:24:44.098000 audit[1928]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.098000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdb953d290 a2=0 a3=7ffdb953d27c items=0 ppid=1858 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.098000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:24:44.102000 audit[1930]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.102000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffeb2205f0 a2=0 a3=7fffeb2205dc items=0 ppid=1858 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:24:44.105000 audit[1932]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.105000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe386ed750 a2=0 a3=7ffe386ed73c items=0 ppid=1858 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:24:44.108000 audit[1934]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.108000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc9d1961e0 a2=0 a3=7ffc9d1961cc items=0 ppid=1858 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.108000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:24:44.128000 audit[1937]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.128000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc5299a180 a2=0 a3=7ffc5299a16c items=0 ppid=1858 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.128000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:24:44.131000 audit[1939]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.131000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff1dae6080 a2=0 a3=7fff1dae606c items=0 ppid=1858 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:24:44.134000 audit[1941]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.134000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff35508af0 a2=0 a3=7fff35508adc items=0 ppid=1858 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:24:44.136000 audit[1943]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.136000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb66017c0 a2=0 a3=7ffdb66017ac items=0 ppid=1858 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:24:44.139070 systemd-networkd[1288]: docker0: Link UP Dec 13 14:24:44.152000 audit[1947]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.152000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd97961960 a2=0 a3=7ffd9796194c items=0 ppid=1858 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.152000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:24:44.158000 audit[1948]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:24:44.158000 audit[1948]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffeb108d560 a2=0 a3=7ffeb108d54c items=0 ppid=1858 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:24:44.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:24:44.160751 env[1858]: time="2024-12-13T14:24:44.160713596Z" level=info msg="Loading containers: done." Dec 13 14:24:44.197023 env[1858]: time="2024-12-13T14:24:44.196604756Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:24:44.197259 env[1858]: time="2024-12-13T14:24:44.197229058Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:24:44.197677 env[1858]: time="2024-12-13T14:24:44.197570514Z" level=info msg="Daemon has completed initialization" Dec 13 14:24:44.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:44.231243 systemd[1]: Started docker.service. Dec 13 14:24:44.241698 env[1858]: time="2024-12-13T14:24:44.241611971Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:24:46.437602 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:24:46.437904 systemd[1]: Stopped kubelet.service. Dec 13 14:24:46.437972 systemd[1]: kubelet.service: Consumed 1.167s CPU time. Dec 13 14:24:46.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:46.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:46.440290 systemd[1]: Starting kubelet.service... Dec 13 14:24:46.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:46.741293 systemd[1]: Started kubelet.service. Dec 13 14:24:46.852860 kubelet[1991]: E1213 14:24:46.852806 1991 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:24:46.858976 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:24:46.859165 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:24:46.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:24:46.941344 env[1563]: time="2024-12-13T14:24:46.941300041Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 14:24:47.521407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3361309937.mount: Deactivated successfully. Dec 13 14:24:49.834010 env[1563]: time="2024-12-13T14:24:49.833957650Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:49.836191 env[1563]: time="2024-12-13T14:24:49.836146069Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:49.838742 env[1563]: time="2024-12-13T14:24:49.838699041Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:49.841020 env[1563]: time="2024-12-13T14:24:49.840976915Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:49.841931 env[1563]: time="2024-12-13T14:24:49.841894109Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 14:24:49.855782 env[1563]: time="2024-12-13T14:24:49.855633470Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 14:24:52.281673 env[1563]: time="2024-12-13T14:24:52.281603538Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:52.284787 env[1563]: time="2024-12-13T14:24:52.284740043Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:52.287961 env[1563]: time="2024-12-13T14:24:52.287914370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:52.290174 env[1563]: time="2024-12-13T14:24:52.290128050Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:52.291228 env[1563]: time="2024-12-13T14:24:52.291186309Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 14:24:52.320703 env[1563]: time="2024-12-13T14:24:52.320644025Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 14:24:53.969125 env[1563]: time="2024-12-13T14:24:53.969067659Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:53.971935 env[1563]: time="2024-12-13T14:24:53.971887939Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:53.974867 env[1563]: time="2024-12-13T14:24:53.974825224Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:53.977751 env[1563]: time="2024-12-13T14:24:53.977708313Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:53.980284 env[1563]: time="2024-12-13T14:24:53.980228543Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 14:24:54.007688 env[1563]: time="2024-12-13T14:24:54.007634590Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:24:54.896296 amazon-ssm-agent[1543]: 2024-12-13 14:24:54 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:24:55.472174 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4261546829.mount: Deactivated successfully. Dec 13 14:24:56.338359 env[1563]: time="2024-12-13T14:24:56.338237466Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:56.342995 env[1563]: time="2024-12-13T14:24:56.342940109Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:56.345087 env[1563]: time="2024-12-13T14:24:56.345044344Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:56.347210 env[1563]: time="2024-12-13T14:24:56.347156669Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:56.349101 env[1563]: time="2024-12-13T14:24:56.349059254Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:24:56.378813 env[1563]: time="2024-12-13T14:24:56.378768857Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:24:56.902861 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2453777829.mount: Deactivated successfully. Dec 13 14:24:56.904820 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:24:56.905105 systemd[1]: Stopped kubelet.service. Dec 13 14:24:56.914951 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:24:56.915042 kernel: audit: type=1130 audit(1734099896.903:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.915082 kernel: audit: type=1131 audit(1734099896.903:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:56.907258 systemd[1]: Starting kubelet.service... Dec 13 14:24:57.149061 systemd[1]: Started kubelet.service. Dec 13 14:24:57.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:57.153751 kernel: audit: type=1130 audit(1734099897.147:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:24:57.371088 kubelet[2023]: E1213 14:24:57.370378 2023 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:24:57.374088 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:24:57.374263 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:24:57.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:24:57.378701 kernel: audit: type=1131 audit(1734099897.372:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:24:58.200480 env[1563]: time="2024-12-13T14:24:58.200421791Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:58.203228 env[1563]: time="2024-12-13T14:24:58.203182452Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:58.205626 env[1563]: time="2024-12-13T14:24:58.205575608Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:58.222083 env[1563]: time="2024-12-13T14:24:58.222035684Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:58.235086 env[1563]: time="2024-12-13T14:24:58.234944682Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:24:58.255277 env[1563]: time="2024-12-13T14:24:58.255218705Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:24:58.733556 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1008653025.mount: Deactivated successfully. Dec 13 14:24:58.740696 env[1563]: time="2024-12-13T14:24:58.740639025Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:58.742849 env[1563]: time="2024-12-13T14:24:58.742804640Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:58.744805 env[1563]: time="2024-12-13T14:24:58.744761166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:58.746451 env[1563]: time="2024-12-13T14:24:58.746415685Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:24:58.747059 env[1563]: time="2024-12-13T14:24:58.747024888Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:24:58.763006 env[1563]: time="2024-12-13T14:24:58.762956301Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 14:24:59.296986 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3106314794.mount: Deactivated successfully. Dec 13 14:25:03.189506 kernel: audit: type=1131 audit(1734099903.168:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.168943 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:25:03.224425 kernel: audit: type=1334 audit(1734099903.211:264): prog-id=43 op=UNLOAD Dec 13 14:25:03.224572 kernel: audit: type=1334 audit(1734099903.211:265): prog-id=42 op=UNLOAD Dec 13 14:25:03.224606 kernel: audit: type=1334 audit(1734099903.211:266): prog-id=41 op=UNLOAD Dec 13 14:25:03.211000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:25:03.211000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:25:03.211000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:25:04.526388 env[1563]: time="2024-12-13T14:25:04.526332607Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:04.529105 env[1563]: time="2024-12-13T14:25:04.529055295Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:04.537141 env[1563]: time="2024-12-13T14:25:04.537090756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:04.545876 env[1563]: time="2024-12-13T14:25:04.545821922Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:04.547116 env[1563]: time="2024-12-13T14:25:04.547067372Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 14:25:07.602120 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:25:07.602386 systemd[1]: Stopped kubelet.service. Dec 13 14:25:07.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.610066 kernel: audit: type=1130 audit(1734099907.601:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.611439 systemd[1]: Starting kubelet.service... Dec 13 14:25:07.614721 kernel: audit: type=1131 audit(1734099907.601:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:08.620066 systemd[1]: Started kubelet.service. Dec 13 14:25:08.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:08.627702 kernel: audit: type=1130 audit(1734099908.619:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:08.768009 kubelet[2107]: E1213 14:25:08.767247 2107 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:25:08.782693 kernel: audit: type=1131 audit(1734099908.775:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:25:08.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:25:08.775275 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:25:08.775446 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:25:10.520386 systemd[1]: Stopped kubelet.service. Dec 13 14:25:10.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:10.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:10.534824 systemd[1]: Starting kubelet.service... Dec 13 14:25:10.541655 kernel: audit: type=1130 audit(1734099910.520:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:10.541830 kernel: audit: type=1131 audit(1734099910.520:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:10.595196 systemd[1]: Reloading. Dec 13 14:25:10.772202 /usr/lib/systemd/system-generators/torcx-generator[2139]: time="2024-12-13T14:25:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:25:10.772245 /usr/lib/systemd/system-generators/torcx-generator[2139]: time="2024-12-13T14:25:10Z" level=info msg="torcx already run" Dec 13 14:25:10.975286 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:25:10.975358 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:25:11.001350 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:25:11.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.121410 kernel: audit: type=1400 audit(1734099911.103:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.121555 kernel: audit: type=1400 audit(1734099911.103:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.121586 kernel: audit: type=1400 audit(1734099911.103:275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.121612 kernel: audit: type=1400 audit(1734099911.103:276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.147417 kernel: audit: type=1400 audit(1734099911.103:277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.147473 kernel: audit: type=1400 audit(1734099911.103:278): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.107000 audit: BPF prog-id=46 op=LOAD Dec 13 14:25:11.107000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:25:11.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.111000 audit: BPF prog-id=47 op=LOAD Dec 13 14:25:11.111000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:25:11.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.134000 audit: BPF prog-id=48 op=LOAD Dec 13 14:25:11.157000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit: BPF prog-id=49 op=LOAD Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.157000 audit: BPF prog-id=50 op=LOAD Dec 13 14:25:11.157000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:25:11.157000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:25:11.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit: BPF prog-id=51 op=LOAD Dec 13 14:25:11.172000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit: BPF prog-id=52 op=LOAD Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.172000 audit: BPF prog-id=53 op=LOAD Dec 13 14:25:11.172000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:25:11.172000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit: BPF prog-id=54 op=LOAD Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.173000 audit: BPF prog-id=55 op=LOAD Dec 13 14:25:11.173000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:25:11.173000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:25:11.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit: BPF prog-id=56 op=LOAD Dec 13 14:25:11.175000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit: BPF prog-id=57 op=LOAD Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.175000 audit: BPF prog-id=58 op=LOAD Dec 13 14:25:11.175000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:25:11.175000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:25:11.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.187000 audit: BPF prog-id=59 op=LOAD Dec 13 14:25:11.187000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:25:11.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:11.191000 audit: BPF prog-id=60 op=LOAD Dec 13 14:25:11.194000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:25:11.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:11.246611 systemd[1]: Started kubelet.service. Dec 13 14:25:11.270453 systemd[1]: Stopping kubelet.service... Dec 13 14:25:11.272895 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:25:11.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:11.275643 systemd[1]: Stopped kubelet.service. Dec 13 14:25:11.280175 systemd[1]: Starting kubelet.service... Dec 13 14:25:11.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:11.529540 systemd[1]: Started kubelet.service. Dec 13 14:25:11.637152 kubelet[2198]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:25:11.637519 kubelet[2198]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:25:11.637519 kubelet[2198]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:25:11.642296 kubelet[2198]: I1213 14:25:11.642214 2198 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:25:11.987225 kubelet[2198]: I1213 14:25:11.987184 2198 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:25:11.987225 kubelet[2198]: I1213 14:25:11.987226 2198 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:25:11.988018 kubelet[2198]: I1213 14:25:11.987991 2198 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:25:12.029209 kubelet[2198]: E1213 14:25:12.028952 2198 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.28.110:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:12.033980 kubelet[2198]: I1213 14:25:12.033941 2198 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:25:12.047586 kubelet[2198]: I1213 14:25:12.047539 2198 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:25:12.050889 kubelet[2198]: I1213 14:25:12.050857 2198 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:25:12.051175 kubelet[2198]: I1213 14:25:12.051101 2198 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:25:12.051321 kubelet[2198]: I1213 14:25:12.051198 2198 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:25:12.051321 kubelet[2198]: I1213 14:25:12.051215 2198 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:25:12.051407 kubelet[2198]: I1213 14:25:12.051362 2198 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:25:12.051499 kubelet[2198]: I1213 14:25:12.051490 2198 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:25:12.051657 kubelet[2198]: I1213 14:25:12.051511 2198 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:25:12.051716 kubelet[2198]: I1213 14:25:12.051681 2198 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:25:12.051716 kubelet[2198]: I1213 14:25:12.051706 2198 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:25:12.054333 kubelet[2198]: W1213 14:25:12.054276 2198 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.31.28.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-110&limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:12.054529 kubelet[2198]: E1213 14:25:12.054344 2198 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.28.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-110&limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:12.054605 kubelet[2198]: W1213 14:25:12.054518 2198 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.31.28.110:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:12.054605 kubelet[2198]: E1213 14:25:12.054564 2198 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.28.110:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:12.055855 kubelet[2198]: I1213 14:25:12.055838 2198 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:25:12.072382 kubelet[2198]: I1213 14:25:12.072334 2198 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:25:12.087756 kubelet[2198]: W1213 14:25:12.086892 2198 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:25:12.092414 kubelet[2198]: I1213 14:25:12.092382 2198 server.go:1256] "Started kubelet" Dec 13 14:25:12.092676 kubelet[2198]: I1213 14:25:12.092640 2198 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:25:12.094841 kubelet[2198]: I1213 14:25:12.094815 2198 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:25:12.095499 kubelet[2198]: I1213 14:25:12.095470 2198 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:25:12.095626 kubelet[2198]: I1213 14:25:12.094877 2198 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:25:12.095000 audit[2198]: AVC avc: denied { mac_admin } for pid=2198 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:12.095000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:12.095000 audit[2198]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb3f50 a1=c000bc3e00 a2=c000bb3f20 a3=25 items=0 ppid=1 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:12.095000 audit[2198]: AVC avc: denied { mac_admin } for pid=2198 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:12.095000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:12.095000 audit[2198]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bdd080 a1=c000bc3e18 a2=c000d08000 a3=25 items=0 ppid=1 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.095000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:12.096749 kubelet[2198]: I1213 14:25:12.096330 2198 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:25:12.096749 kubelet[2198]: I1213 14:25:12.096388 2198 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:25:12.097678 kubelet[2198]: I1213 14:25:12.097605 2198 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:25:12.102000 audit[2208]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:12.102000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc41e25ca0 a2=0 a3=7ffc41e25c8c items=0 ppid=2198 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:25:12.105000 audit[2209]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:12.105000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd24e89fc0 a2=0 a3=7ffd24e89fac items=0 ppid=2198 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:25:12.112371 kubelet[2198]: I1213 14:25:12.112308 2198 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:25:12.116873 kubelet[2198]: E1213 14:25:12.116845 2198 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.28.110:6443/api/v1/namespaces/default/events\": dial tcp 172.31.28.110:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-28-110.1810c2aeb14cf534 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-28-110,UID:ip-172-31-28-110,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-28-110,},FirstTimestamp:2024-12-13 14:25:12.092349748 +0000 UTC m=+0.551339664,LastTimestamp:2024-12-13 14:25:12.092349748 +0000 UTC m=+0.551339664,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-28-110,}" Dec 13 14:25:12.119000 audit[2211]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:12.119000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd9f71400 a2=0 a3=7fffd9f713ec items=0 ppid=2198 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:25:12.120619 kubelet[2198]: I1213 14:25:12.120591 2198 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:25:12.120736 kubelet[2198]: I1213 14:25:12.120711 2198 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:25:12.121808 kubelet[2198]: W1213 14:25:12.121725 2198 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.28.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:12.121921 kubelet[2198]: E1213 14:25:12.121845 2198 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.28.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:12.123182 kubelet[2198]: E1213 14:25:12.123164 2198 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-110?timeout=10s\": dial tcp 172.31.28.110:6443: connect: connection refused" interval="200ms" Dec 13 14:25:12.124055 kubelet[2198]: I1213 14:25:12.124037 2198 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:25:12.124437 kubelet[2198]: I1213 14:25:12.124417 2198 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:25:12.125952 kubelet[2198]: E1213 14:25:12.125919 2198 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:25:12.128449 kubelet[2198]: I1213 14:25:12.128419 2198 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:25:12.150000 audit[2215]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:12.150000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe8018cb60 a2=0 a3=7ffe8018cb4c items=0 ppid=2198 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:25:12.157357 kubelet[2198]: I1213 14:25:12.157322 2198 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:25:12.157357 kubelet[2198]: I1213 14:25:12.157346 2198 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:25:12.157357 kubelet[2198]: I1213 14:25:12.157365 2198 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:25:12.159992 kubelet[2198]: I1213 14:25:12.159956 2198 policy_none.go:49] "None policy: Start" Dec 13 14:25:12.163091 kubelet[2198]: I1213 14:25:12.163058 2198 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:25:12.163091 kubelet[2198]: I1213 14:25:12.163092 2198 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:25:12.171791 systemd[1]: Created slice kubepods.slice. Dec 13 14:25:12.177526 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:25:12.181387 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:25:12.188000 audit[2198]: AVC avc: denied { mac_admin } for pid=2198 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:12.188000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:12.188000 audit[2198]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00062f560 a1=c000642738 a2=c00062f530 a3=25 items=0 ppid=1 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.188000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:12.195977 kubelet[2198]: I1213 14:25:12.189539 2198 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:25:12.195977 kubelet[2198]: I1213 14:25:12.189647 2198 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:25:12.195977 kubelet[2198]: E1213 14:25:12.193977 2198 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-28-110\" not found" Dec 13 14:25:12.195977 kubelet[2198]: I1213 14:25:12.194280 2198 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:25:12.206000 audit[2220]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:12.206000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe9bc3ae40 a2=0 a3=7ffe9bc3ae2c items=0 ppid=2198 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:25:12.210847 kubelet[2198]: I1213 14:25:12.210812 2198 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:25:12.215000 audit[2222]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:12.215000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe97a97110 a2=0 a3=7ffe97a970fc items=0 ppid=2198 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:25:12.216000 audit[2223]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:12.216000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffb5d5dc50 a2=0 a3=10e3 items=0 ppid=2198 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.216000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:25:12.218982 kubelet[2198]: I1213 14:25:12.218963 2198 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:25:12.219584 kubelet[2198]: I1213 14:25:12.219568 2198 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:25:12.220169 kubelet[2198]: I1213 14:25:12.219779 2198 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:25:12.220169 kubelet[2198]: E1213 14:25:12.219838 2198 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:25:12.220000 audit[2224]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:12.220000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffed78e3f0 a2=0 a3=7fffed78e3dc items=0 ppid=2198 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:25:12.224126 kubelet[2198]: W1213 14:25:12.224071 2198 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.31.28.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:12.223000 audit[2225]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:12.223000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9bf45e30 a2=0 a3=7fff9bf45e1c items=0 ppid=2198 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:25:12.225937 kubelet[2198]: E1213 14:25:12.225919 2198 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.28.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:12.225000 audit[2226]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:12.225000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebc2fba20 a2=0 a3=7ffebc2fba0c items=0 ppid=2198 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:25:12.227524 kubelet[2198]: I1213 14:25:12.227014 2198 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-110" Dec 13 14:25:12.228141 kubelet[2198]: E1213 14:25:12.228127 2198 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.28.110:6443/api/v1/nodes\": dial tcp 172.31.28.110:6443: connect: connection refused" node="ip-172-31-28-110" Dec 13 14:25:12.228000 audit[2228]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:12.228000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe8814ef90 a2=0 a3=7ffe8814ef7c items=0 ppid=2198 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:25:12.229000 audit[2229]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:12.229000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe577a3ff0 a2=0 a3=7ffe577a3fdc items=0 ppid=2198 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:12.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:25:12.321225 kubelet[2198]: I1213 14:25:12.320951 2198 topology_manager.go:215] "Topology Admit Handler" podUID="dc7f987257afad4fc360a926281ebc6d" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-28-110" Dec 13 14:25:12.324437 kubelet[2198]: E1213 14:25:12.324406 2198 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-110?timeout=10s\": dial tcp 172.31.28.110:6443: connect: connection refused" interval="400ms" Dec 13 14:25:12.329769 kubelet[2198]: I1213 14:25:12.329685 2198 topology_manager.go:215] "Topology Admit Handler" podUID="77701a1a819666d22b13f78b541aa62f" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:12.337454 kubelet[2198]: I1213 14:25:12.337248 2198 topology_manager.go:215] "Topology Admit Handler" podUID="9330d39c14110a1f69e5839e4c56fce4" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-28-110" Dec 13 14:25:12.355458 systemd[1]: Created slice kubepods-burstable-poddc7f987257afad4fc360a926281ebc6d.slice. Dec 13 14:25:12.375009 systemd[1]: Created slice kubepods-burstable-pod77701a1a819666d22b13f78b541aa62f.slice. Dec 13 14:25:12.381171 systemd[1]: Created slice kubepods-burstable-pod9330d39c14110a1f69e5839e4c56fce4.slice. Dec 13 14:25:12.422257 kubelet[2198]: I1213 14:25:12.422210 2198 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/77701a1a819666d22b13f78b541aa62f-kubeconfig\") pod \"kube-controller-manager-ip-172-31-28-110\" (UID: \"77701a1a819666d22b13f78b541aa62f\") " pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:12.422486 kubelet[2198]: I1213 14:25:12.422272 2198 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/77701a1a819666d22b13f78b541aa62f-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-28-110\" (UID: \"77701a1a819666d22b13f78b541aa62f\") " pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:12.422486 kubelet[2198]: I1213 14:25:12.422304 2198 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9330d39c14110a1f69e5839e4c56fce4-kubeconfig\") pod \"kube-scheduler-ip-172-31-28-110\" (UID: \"9330d39c14110a1f69e5839e4c56fce4\") " pod="kube-system/kube-scheduler-ip-172-31-28-110" Dec 13 14:25:12.422486 kubelet[2198]: I1213 14:25:12.422334 2198 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dc7f987257afad4fc360a926281ebc6d-ca-certs\") pod \"kube-apiserver-ip-172-31-28-110\" (UID: \"dc7f987257afad4fc360a926281ebc6d\") " pod="kube-system/kube-apiserver-ip-172-31-28-110" Dec 13 14:25:12.422486 kubelet[2198]: I1213 14:25:12.422363 2198 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dc7f987257afad4fc360a926281ebc6d-k8s-certs\") pod \"kube-apiserver-ip-172-31-28-110\" (UID: \"dc7f987257afad4fc360a926281ebc6d\") " pod="kube-system/kube-apiserver-ip-172-31-28-110" Dec 13 14:25:12.422486 kubelet[2198]: I1213 14:25:12.422394 2198 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dc7f987257afad4fc360a926281ebc6d-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-28-110\" (UID: \"dc7f987257afad4fc360a926281ebc6d\") " pod="kube-system/kube-apiserver-ip-172-31-28-110" Dec 13 14:25:12.423097 kubelet[2198]: I1213 14:25:12.422479 2198 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/77701a1a819666d22b13f78b541aa62f-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-28-110\" (UID: \"77701a1a819666d22b13f78b541aa62f\") " pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:12.423097 kubelet[2198]: I1213 14:25:12.422517 2198 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/77701a1a819666d22b13f78b541aa62f-ca-certs\") pod \"kube-controller-manager-ip-172-31-28-110\" (UID: \"77701a1a819666d22b13f78b541aa62f\") " pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:12.423097 kubelet[2198]: I1213 14:25:12.422549 2198 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/77701a1a819666d22b13f78b541aa62f-k8s-certs\") pod \"kube-controller-manager-ip-172-31-28-110\" (UID: \"77701a1a819666d22b13f78b541aa62f\") " pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:12.430902 kubelet[2198]: I1213 14:25:12.430868 2198 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-110" Dec 13 14:25:12.431244 kubelet[2198]: E1213 14:25:12.431223 2198 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.28.110:6443/api/v1/nodes\": dial tcp 172.31.28.110:6443: connect: connection refused" node="ip-172-31-28-110" Dec 13 14:25:12.672611 env[1563]: time="2024-12-13T14:25:12.672368952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-28-110,Uid:dc7f987257afad4fc360a926281ebc6d,Namespace:kube-system,Attempt:0,}" Dec 13 14:25:12.680040 env[1563]: time="2024-12-13T14:25:12.679986489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-28-110,Uid:77701a1a819666d22b13f78b541aa62f,Namespace:kube-system,Attempt:0,}" Dec 13 14:25:12.686459 env[1563]: time="2024-12-13T14:25:12.686407206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-28-110,Uid:9330d39c14110a1f69e5839e4c56fce4,Namespace:kube-system,Attempt:0,}" Dec 13 14:25:12.726094 kubelet[2198]: E1213 14:25:12.726056 2198 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-110?timeout=10s\": dial tcp 172.31.28.110:6443: connect: connection refused" interval="800ms" Dec 13 14:25:12.833684 kubelet[2198]: I1213 14:25:12.833644 2198 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-110" Dec 13 14:25:12.834296 kubelet[2198]: E1213 14:25:12.834279 2198 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.28.110:6443/api/v1/nodes\": dial tcp 172.31.28.110:6443: connect: connection refused" node="ip-172-31-28-110" Dec 13 14:25:12.915763 kubelet[2198]: W1213 14:25:12.915698 2198 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.31.28.110:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:12.915763 kubelet[2198]: E1213 14:25:12.915764 2198 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.28.110:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:13.090807 kubelet[2198]: W1213 14:25:13.090703 2198 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.28.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:13.090807 kubelet[2198]: E1213 14:25:13.090750 2198 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.28.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:13.164299 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2668602587.mount: Deactivated successfully. Dec 13 14:25:13.183286 env[1563]: time="2024-12-13T14:25:13.183231582Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.184558 env[1563]: time="2024-12-13T14:25:13.184449882Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.191563 env[1563]: time="2024-12-13T14:25:13.191513312Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.195286 env[1563]: time="2024-12-13T14:25:13.195236987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.197749 env[1563]: time="2024-12-13T14:25:13.197650610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.201228 env[1563]: time="2024-12-13T14:25:13.201079198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.207615 env[1563]: time="2024-12-13T14:25:13.207503871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.216334 env[1563]: time="2024-12-13T14:25:13.216228743Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.222933 env[1563]: time="2024-12-13T14:25:13.222856093Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.226193 env[1563]: time="2024-12-13T14:25:13.226152200Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.226898 env[1563]: time="2024-12-13T14:25:13.226863586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.242727 env[1563]: time="2024-12-13T14:25:13.242684600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.243407 env[1563]: time="2024-12-13T14:25:13.243333083Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:13.243534 env[1563]: time="2024-12-13T14:25:13.243424013Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:13.243534 env[1563]: time="2024-12-13T14:25:13.243455804Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:13.243836 env[1563]: time="2024-12-13T14:25:13.243788598Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8bbb39ed775ce511bd1b9c04a41b3e96726240ec8b69c27a4323ff2f5cbcc36 pid=2237 runtime=io.containerd.runc.v2 Dec 13 14:25:13.288166 env[1563]: time="2024-12-13T14:25:13.288075054Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:13.288349 env[1563]: time="2024-12-13T14:25:13.288179674Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:13.288349 env[1563]: time="2024-12-13T14:25:13.288221190Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:13.288877 env[1563]: time="2024-12-13T14:25:13.288810905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3f93d710192e11909bf8d1d3be4dcb1ecf7eb050d7319bce27144427a21948e pid=2256 runtime=io.containerd.runc.v2 Dec 13 14:25:13.289205 env[1563]: time="2024-12-13T14:25:13.289151259Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:13.289275 env[1563]: time="2024-12-13T14:25:13.289186105Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:13.289438 env[1563]: time="2024-12-13T14:25:13.289337556Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:13.289743 env[1563]: time="2024-12-13T14:25:13.289627498Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03b933e905a1956a7b3d3042ef69e2ef2d77f8ed126a2b5edc95e7a8723846fe pid=2270 runtime=io.containerd.runc.v2 Dec 13 14:25:13.299732 systemd[1]: Started cri-containerd-e8bbb39ed775ce511bd1b9c04a41b3e96726240ec8b69c27a4323ff2f5cbcc36.scope. Dec 13 14:25:13.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.331000 audit: BPF prog-id=61 op=LOAD Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2237 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538626262333965643737356365353131626431623963303461343162 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2237 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538626262333965643737356365353131626431623963303461343162 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit: BPF prog-id=62 op=LOAD Dec 13 14:25:13.332000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000287a20 items=0 ppid=2237 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538626262333965643737356365353131626431623963303461343162 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit: BPF prog-id=63 op=LOAD Dec 13 14:25:13.332000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000287a68 items=0 ppid=2237 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538626262333965643737356365353131626431623963303461343162 Dec 13 14:25:13.332000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:25:13.332000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.332000 audit: BPF prog-id=64 op=LOAD Dec 13 14:25:13.332000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000287e78 items=0 ppid=2237 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538626262333965643737356365353131626431623963303461343162 Dec 13 14:25:13.342614 systemd[1]: Started cri-containerd-a3f93d710192e11909bf8d1d3be4dcb1ecf7eb050d7319bce27144427a21948e.scope. Dec 13 14:25:13.365094 systemd[1]: Started cri-containerd-03b933e905a1956a7b3d3042ef69e2ef2d77f8ed126a2b5edc95e7a8723846fe.scope. Dec 13 14:25:13.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.410000 audit: BPF prog-id=65 op=LOAD Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2256 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663933643731303139326531313930396266386431643362653464 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2256 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663933643731303139326531313930396266386431643362653464 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit: BPF prog-id=66 op=LOAD Dec 13 14:25:13.411000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000207db0 items=0 ppid=2256 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663933643731303139326531313930396266386431643362653464 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit: BPF prog-id=67 op=LOAD Dec 13 14:25:13.411000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000207df8 items=0 ppid=2256 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663933643731303139326531313930396266386431643362653464 Dec 13 14:25:13.411000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:25:13.411000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.411000 audit: BPF prog-id=68 op=LOAD Dec 13 14:25:13.411000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000414208 items=0 ppid=2256 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133663933643731303139326531313930396266386431643362653464 Dec 13 14:25:13.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.420000 audit: BPF prog-id=69 op=LOAD Dec 13 14:25:13.420000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.420000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2270 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623933336539303561313935366137623364333034326566363965 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2270 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623933336539303561313935366137623364333034326566363965 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.421000 audit: BPF prog-id=70 op=LOAD Dec 13 14:25:13.421000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfce0 items=0 ppid=2270 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623933336539303561313935366137623364333034326566363965 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit: BPF prog-id=71 op=LOAD Dec 13 14:25:13.422000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfd28 items=0 ppid=2270 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623933336539303561313935366137623364333034326566363965 Dec 13 14:25:13.422000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:25:13.422000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.422000 audit: BPF prog-id=72 op=LOAD Dec 13 14:25:13.422000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00035e138 items=0 ppid=2270 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623933336539303561313935366137623364333034326566363965 Dec 13 14:25:13.429374 env[1563]: time="2024-12-13T14:25:13.429319261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-28-110,Uid:dc7f987257afad4fc360a926281ebc6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"e8bbb39ed775ce511bd1b9c04a41b3e96726240ec8b69c27a4323ff2f5cbcc36\"" Dec 13 14:25:13.436137 env[1563]: time="2024-12-13T14:25:13.436022086Z" level=info msg="CreateContainer within sandbox \"e8bbb39ed775ce511bd1b9c04a41b3e96726240ec8b69c27a4323ff2f5cbcc36\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:25:13.445891 kubelet[2198]: W1213 14:25:13.445728 2198 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.31.28.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-110&limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:13.445891 kubelet[2198]: E1213 14:25:13.445844 2198 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.28.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-110&limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:13.492058 env[1563]: time="2024-12-13T14:25:13.492004355Z" level=info msg="CreateContainer within sandbox \"e8bbb39ed775ce511bd1b9c04a41b3e96726240ec8b69c27a4323ff2f5cbcc36\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"915b1036d71715b68fdec66b5687ef2cde012779f185693b99728d7fa3257899\"" Dec 13 14:25:13.493882 env[1563]: time="2024-12-13T14:25:13.493848050Z" level=info msg="StartContainer for \"915b1036d71715b68fdec66b5687ef2cde012779f185693b99728d7fa3257899\"" Dec 13 14:25:13.537128 kubelet[2198]: E1213 14:25:13.537096 2198 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-110?timeout=10s\": dial tcp 172.31.28.110:6443: connect: connection refused" interval="1.6s" Dec 13 14:25:13.558068 env[1563]: time="2024-12-13T14:25:13.557995471Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-28-110,Uid:77701a1a819666d22b13f78b541aa62f,Namespace:kube-system,Attempt:0,} returns sandbox id \"03b933e905a1956a7b3d3042ef69e2ef2d77f8ed126a2b5edc95e7a8723846fe\"" Dec 13 14:25:13.563904 env[1563]: time="2024-12-13T14:25:13.563857020Z" level=info msg="CreateContainer within sandbox \"03b933e905a1956a7b3d3042ef69e2ef2d77f8ed126a2b5edc95e7a8723846fe\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:25:13.582470 systemd[1]: Started cri-containerd-915b1036d71715b68fdec66b5687ef2cde012779f185693b99728d7fa3257899.scope. Dec 13 14:25:13.589401 env[1563]: time="2024-12-13T14:25:13.588821619Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-28-110,Uid:9330d39c14110a1f69e5839e4c56fce4,Namespace:kube-system,Attempt:0,} returns sandbox id \"a3f93d710192e11909bf8d1d3be4dcb1ecf7eb050d7319bce27144427a21948e\"" Dec 13 14:25:13.599259 env[1563]: time="2024-12-13T14:25:13.599202013Z" level=info msg="CreateContainer within sandbox \"a3f93d710192e11909bf8d1d3be4dcb1ecf7eb050d7319bce27144427a21948e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:25:13.605801 env[1563]: time="2024-12-13T14:25:13.597423590Z" level=info msg="CreateContainer within sandbox \"03b933e905a1956a7b3d3042ef69e2ef2d77f8ed126a2b5edc95e7a8723846fe\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"0825dfed4a6d19c8998c51320d6318fbc78fe4b6c6bec4128e424e14cd44f8f0\"" Dec 13 14:25:13.607153 env[1563]: time="2024-12-13T14:25:13.607119209Z" level=info msg="StartContainer for \"0825dfed4a6d19c8998c51320d6318fbc78fe4b6c6bec4128e424e14cd44f8f0\"" Dec 13 14:25:13.614098 kubelet[2198]: W1213 14:25:13.613973 2198 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.31.28.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:13.614098 kubelet[2198]: E1213 14:25:13.614051 2198 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.28.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:13.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.617000 audit: BPF prog-id=73 op=LOAD Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2237 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356231303336643731373135623638666465633636623536383765 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2237 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356231303336643731373135623638666465633636623536383765 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit: BPF prog-id=74 op=LOAD Dec 13 14:25:13.619000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003e2020 items=0 ppid=2237 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356231303336643731373135623638666465633636623536383765 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit: BPF prog-id=75 op=LOAD Dec 13 14:25:13.619000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003e2068 items=0 ppid=2237 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356231303336643731373135623638666465633636623536383765 Dec 13 14:25:13.619000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:25:13.619000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.619000 audit: BPF prog-id=76 op=LOAD Dec 13 14:25:13.619000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003e2478 items=0 ppid=2237 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356231303336643731373135623638666465633636623536383765 Dec 13 14:25:13.642380 kubelet[2198]: I1213 14:25:13.641876 2198 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-110" Dec 13 14:25:13.642380 kubelet[2198]: E1213 14:25:13.642342 2198 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.28.110:6443/api/v1/nodes\": dial tcp 172.31.28.110:6443: connect: connection refused" node="ip-172-31-28-110" Dec 13 14:25:13.658154 env[1563]: time="2024-12-13T14:25:13.658097055Z" level=info msg="CreateContainer within sandbox \"a3f93d710192e11909bf8d1d3be4dcb1ecf7eb050d7319bce27144427a21948e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"f3d91a3858e03638cdce538558cc1ffda8567825167fbe94c20084e3ac72351c\"" Dec 13 14:25:13.660093 env[1563]: time="2024-12-13T14:25:13.660053061Z" level=info msg="StartContainer for \"f3d91a3858e03638cdce538558cc1ffda8567825167fbe94c20084e3ac72351c\"" Dec 13 14:25:13.679568 systemd[1]: Started cri-containerd-0825dfed4a6d19c8998c51320d6318fbc78fe4b6c6bec4128e424e14cd44f8f0.scope. Dec 13 14:25:13.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.703732 kernel: kauditd_printk_skb: 445 callbacks suppressed Dec 13 14:25:13.703834 kernel: audit: type=1400 audit(1734099913.701:535): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711683 kernel: audit: type=1400 audit(1734099913.701:536): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711780 kernel: audit: type=1400 audit(1734099913.701:537): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.719572 kernel: audit: type=1400 audit(1734099913.701:538): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727803 kernel: audit: type=1400 audit(1734099913.701:539): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727923 kernel: audit: type=1400 audit(1734099913.701:540): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.732937 kernel: audit: type=1400 audit(1734099913.701:541): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.736144 env[1563]: time="2024-12-13T14:25:13.736049621Z" level=info msg="StartContainer for \"915b1036d71715b68fdec66b5687ef2cde012779f185693b99728d7fa3257899\" returns successfully" Dec 13 14:25:13.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.753401 kernel: audit: type=1400 audit(1734099913.701:542): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.753524 kernel: audit: type=1400 audit(1734099913.701:543): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.757739 kernel: audit: type=1400 audit(1734099913.701:544): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.755521 systemd[1]: Started cri-containerd-f3d91a3858e03638cdce538558cc1ffda8567825167fbe94c20084e3ac72351c.scope. Dec 13 14:25:13.701000 audit: BPF prog-id=77 op=LOAD Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2270 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038323564666564346136643139633839393863353133323064363331 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2270 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038323564666564346136643139633839393863353133323064363331 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.702000 audit: BPF prog-id=78 op=LOAD Dec 13 14:25:13.702000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001addb0 items=0 ppid=2270 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038323564666564346136643139633839393863353133323064363331 Dec 13 14:25:13.711000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.711000 audit: BPF prog-id=79 op=LOAD Dec 13 14:25:13.711000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001addf8 items=0 ppid=2270 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038323564666564346136643139633839393863353133323064363331 Dec 13 14:25:13.727000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:25:13.727000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:25:13.727000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.727000 audit: BPF prog-id=80 op=LOAD Dec 13 14:25:13.727000 audit[2388]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001f8208 items=0 ppid=2270 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038323564666564346136643139633839393863353133323064363331 Dec 13 14:25:13.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.795000 audit: BPF prog-id=81 op=LOAD Dec 13 14:25:13.797000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.797000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2256 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633643931613338353865303336333863646365353338353538636331 Dec 13 14:25:13.798000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.798000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2256 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633643931613338353865303336333863646365353338353538636331 Dec 13 14:25:13.799000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.799000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.799000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.799000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.799000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.799000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.799000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.799000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.799000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.799000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.799000 audit: BPF prog-id=82 op=LOAD Dec 13 14:25:13.799000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000243a0 items=0 ppid=2256 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633643931613338353865303336333863646365353338353538636331 Dec 13 14:25:13.800000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.800000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.800000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.800000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.800000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.800000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.800000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.800000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.800000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.800000 audit: BPF prog-id=83 op=LOAD Dec 13 14:25:13.800000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243e8 items=0 ppid=2256 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633643931613338353865303336333863646365353338353538636331 Dec 13 14:25:13.806000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:25:13.806000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:25:13.806000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.806000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.806000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.806000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.806000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.806000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.806000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.806000 audit[2418]: AVC avc: denied { perfmon } for pid=2418 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.806000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.806000 audit[2418]: AVC avc: denied { bpf } for pid=2418 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:13.806000 audit: BPF prog-id=84 op=LOAD Dec 13 14:25:13.806000 audit[2418]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247f8 items=0 ppid=2256 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:13.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633643931613338353865303336333863646365353338353538636331 Dec 13 14:25:13.822823 env[1563]: time="2024-12-13T14:25:13.822772230Z" level=info msg="StartContainer for \"0825dfed4a6d19c8998c51320d6318fbc78fe4b6c6bec4128e424e14cd44f8f0\" returns successfully" Dec 13 14:25:13.879228 env[1563]: time="2024-12-13T14:25:13.879112828Z" level=info msg="StartContainer for \"f3d91a3858e03638cdce538558cc1ffda8567825167fbe94c20084e3ac72351c\" returns successfully" Dec 13 14:25:14.124526 kubelet[2198]: E1213 14:25:14.124482 2198 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.28.110:6443/api/v1/namespaces/default/events\": dial tcp 172.31.28.110:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-28-110.1810c2aeb14cf534 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-28-110,UID:ip-172-31-28-110,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-28-110,},FirstTimestamp:2024-12-13 14:25:12.092349748 +0000 UTC m=+0.551339664,LastTimestamp:2024-12-13 14:25:12.092349748 +0000 UTC m=+0.551339664,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-28-110,}" Dec 13 14:25:14.124526 kubelet[2198]: E1213 14:25:14.124284 2198 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.28.110:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:15.107326 kubelet[2198]: W1213 14:25:15.107250 2198 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.28.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:15.107326 kubelet[2198]: E1213 14:25:15.107333 2198 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.28.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.110:6443: connect: connection refused Dec 13 14:25:15.138381 kubelet[2198]: E1213 14:25:15.138343 2198 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-110?timeout=10s\": dial tcp 172.31.28.110:6443: connect: connection refused" interval="3.2s" Dec 13 14:25:15.245206 kubelet[2198]: I1213 14:25:15.245175 2198 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-110" Dec 13 14:25:15.245602 kubelet[2198]: E1213 14:25:15.245579 2198 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.28.110:6443/api/v1/nodes\": dial tcp 172.31.28.110:6443: connect: connection refused" node="ip-172-31-28-110" Dec 13 14:25:15.272000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:15.272000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000116f60 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:25:15.272000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:15.273000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:15.273000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000150480 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:25:15.273000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:17.136000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:17.136000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0048df590 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:25:17.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:25:17.136000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:17.136000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0042ebc80 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:25:17.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:25:17.137000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:17.137000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0048df6b0 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:25:17.137000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:25:17.138000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:17.138000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c007f1dfb0 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:25:17.138000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:25:17.165000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:17.165000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c0032c1fa0 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:25:17.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:25:17.165000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:17.165000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c0048dfd70 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:25:17.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:25:17.630682 kubelet[2198]: E1213 14:25:17.630639 2198 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-28-110" not found Dec 13 14:25:17.989732 kubelet[2198]: E1213 14:25:17.989528 2198 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-28-110" not found Dec 13 14:25:18.057213 kubelet[2198]: I1213 14:25:18.057171 2198 apiserver.go:52] "Watching apiserver" Dec 13 14:25:18.122203 kubelet[2198]: I1213 14:25:18.122143 2198 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:25:18.345492 kubelet[2198]: E1213 14:25:18.345058 2198 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-28-110\" not found" node="ip-172-31-28-110" Dec 13 14:25:18.411694 update_engine[1557]: I1213 14:25:18.410724 1557 update_attempter.cc:509] Updating boot flags... Dec 13 14:25:18.468172 kubelet[2198]: I1213 14:25:18.468144 2198 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-110" Dec 13 14:25:18.498481 kubelet[2198]: I1213 14:25:18.498453 2198 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-28-110" Dec 13 14:25:20.805787 systemd[1]: Reloading. Dec 13 14:25:20.968155 /usr/lib/systemd/system-generators/torcx-generator[2586]: time="2024-12-13T14:25:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:25:20.968197 /usr/lib/systemd/system-generators/torcx-generator[2586]: time="2024-12-13T14:25:20Z" level=info msg="torcx already run" Dec 13 14:25:21.135901 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:25:21.135923 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:25:21.157390 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:25:21.311525 kernel: kauditd_printk_skb: 128 callbacks suppressed Dec 13 14:25:21.311685 kernel: audit: type=1400 audit(1734099921.301:579): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.311802 kernel: audit: type=1400 audit(1734099921.301:580): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.322840 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:25:21.323042 kernel: audit: type=1400 audit(1734099921.302:581): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.323084 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:25:21.323159 kernel: audit: backlog limit exceeded Dec 13 14:25:21.323192 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:25:21.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.326796 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:25:21.326922 kernel: audit: backlog limit exceeded Dec 13 14:25:21.330844 kernel: audit: type=1400 audit(1734099921.302:582): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.306000 audit: BPF prog-id=85 op=LOAD Dec 13 14:25:21.306000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:25:21.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.310000 audit: BPF prog-id=86 op=LOAD Dec 13 14:25:21.310000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:25:21.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.312000 audit: BPF prog-id=87 op=LOAD Dec 13 14:25:21.312000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:25:21.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.314000 audit: BPF prog-id=88 op=LOAD Dec 13 14:25:21.314000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit: BPF prog-id=89 op=LOAD Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.321000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:25:21.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.336000 audit: BPF prog-id=92 op=LOAD Dec 13 14:25:21.336000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:25:21.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.338000 audit: BPF prog-id=93 op=LOAD Dec 13 14:25:21.338000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:25:21.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.353000 audit: BPF prog-id=94 op=LOAD Dec 13 14:25:21.353000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit: BPF prog-id=95 op=LOAD Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.354000 audit: BPF prog-id=96 op=LOAD Dec 13 14:25:21.354000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:25:21.354000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:25:21.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.356000 audit: BPF prog-id=97 op=LOAD Dec 13 14:25:21.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.357000 audit: BPF prog-id=98 op=LOAD Dec 13 14:25:21.357000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:25:21.357000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:25:21.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.361000 audit: BPF prog-id=99 op=LOAD Dec 13 14:25:21.361000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:25:21.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.363000 audit: BPF prog-id=100 op=LOAD Dec 13 14:25:21.363000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:25:21.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit: BPF prog-id=101 op=LOAD Dec 13 14:25:21.365000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.365000 audit: BPF prog-id=102 op=LOAD Dec 13 14:25:21.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.367000 audit: BPF prog-id=103 op=LOAD Dec 13 14:25:21.367000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:25:21.367000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:25:21.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.376000 audit: BPF prog-id=104 op=LOAD Dec 13 14:25:21.376000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:25:21.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:21.377000 audit: BPF prog-id=105 op=LOAD Dec 13 14:25:21.377000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:25:21.412342 systemd[1]: Stopping kubelet.service... Dec 13 14:25:21.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:21.446033 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:25:21.446218 systemd[1]: Stopped kubelet.service. Dec 13 14:25:21.449159 systemd[1]: Starting kubelet.service... Dec 13 14:25:21.473000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:21.473000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cc0a80 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:25:21.473000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:21.475000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:21.475000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c72920 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:25:21.475000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:21.477000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:21.477000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c72940 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:25:21.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:21.478000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:21.478000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c72960 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:25:21.478000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:23.184391 systemd[1]: Started kubelet.service. Dec 13 14:25:23.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:23.319593 kubelet[2645]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:25:23.320057 kubelet[2645]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:25:23.320216 kubelet[2645]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:25:23.332866 kubelet[2645]: I1213 14:25:23.332783 2645 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:25:23.370347 kubelet[2645]: I1213 14:25:23.369923 2645 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:25:23.370347 kubelet[2645]: I1213 14:25:23.369956 2645 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:25:23.370347 kubelet[2645]: I1213 14:25:23.370231 2645 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:25:23.384887 kubelet[2645]: I1213 14:25:23.384839 2645 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:25:23.400066 kubelet[2645]: I1213 14:25:23.397503 2645 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:25:23.464431 kubelet[2645]: I1213 14:25:23.462992 2645 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:25:23.464431 kubelet[2645]: I1213 14:25:23.463371 2645 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:25:23.464431 kubelet[2645]: I1213 14:25:23.463627 2645 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:25:23.464431 kubelet[2645]: I1213 14:25:23.463655 2645 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:25:23.464431 kubelet[2645]: I1213 14:25:23.463685 2645 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:25:23.464431 kubelet[2645]: I1213 14:25:23.463723 2645 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:25:23.467629 kubelet[2645]: I1213 14:25:23.467595 2645 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:25:23.467629 kubelet[2645]: I1213 14:25:23.467634 2645 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:25:23.467860 kubelet[2645]: I1213 14:25:23.467755 2645 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:25:23.467860 kubelet[2645]: I1213 14:25:23.467778 2645 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:25:23.473975 kubelet[2645]: I1213 14:25:23.473027 2645 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:25:23.473975 kubelet[2645]: I1213 14:25:23.473273 2645 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:25:23.473975 kubelet[2645]: I1213 14:25:23.473947 2645 server.go:1256] "Started kubelet" Dec 13 14:25:23.481000 audit[2645]: AVC avc: denied { mac_admin } for pid=2645 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.481000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:23.481000 audit[2645]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00094fbf0 a1=c000976ee8 a2=c00094fbc0 a3=25 items=0 ppid=1 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:23.481000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:23.481000 audit[2645]: AVC avc: denied { mac_admin } for pid=2645 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.481000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:23.481000 audit[2645]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00078b320 a1=c000976f00 a2=c00094fc80 a3=25 items=0 ppid=1 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:23.481000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:23.484801 kubelet[2645]: I1213 14:25:23.482527 2645 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:25:23.484801 kubelet[2645]: I1213 14:25:23.482584 2645 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:25:23.484801 kubelet[2645]: I1213 14:25:23.482624 2645 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:25:23.494372 kubelet[2645]: I1213 14:25:23.492070 2645 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:25:23.494846 kubelet[2645]: I1213 14:25:23.494816 2645 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:25:23.498782 kubelet[2645]: I1213 14:25:23.498050 2645 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:25:23.498782 kubelet[2645]: I1213 14:25:23.498340 2645 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:25:23.500941 kubelet[2645]: I1213 14:25:23.500912 2645 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:25:23.504401 kubelet[2645]: I1213 14:25:23.504120 2645 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:25:23.504401 kubelet[2645]: I1213 14:25:23.504366 2645 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:25:23.507340 kubelet[2645]: I1213 14:25:23.507305 2645 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:25:23.508886 kubelet[2645]: I1213 14:25:23.508853 2645 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:25:23.508886 kubelet[2645]: I1213 14:25:23.508892 2645 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:25:23.509130 kubelet[2645]: I1213 14:25:23.508968 2645 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:25:23.509130 kubelet[2645]: E1213 14:25:23.509028 2645 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:25:23.561140 kubelet[2645]: I1213 14:25:23.553969 2645 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:25:23.561140 kubelet[2645]: I1213 14:25:23.553991 2645 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:25:23.561140 kubelet[2645]: I1213 14:25:23.554087 2645 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:25:23.633253 kubelet[2645]: E1213 14:25:23.631891 2645 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:25:23.646414 kubelet[2645]: I1213 14:25:23.645811 2645 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-28-110" Dec 13 14:25:23.679480 kubelet[2645]: I1213 14:25:23.678184 2645 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-28-110" Dec 13 14:25:23.679480 kubelet[2645]: I1213 14:25:23.678277 2645 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-28-110" Dec 13 14:25:23.703959 kubelet[2645]: I1213 14:25:23.703922 2645 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:25:23.703959 kubelet[2645]: I1213 14:25:23.703947 2645 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:25:23.703959 kubelet[2645]: I1213 14:25:23.703967 2645 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:25:23.704332 kubelet[2645]: I1213 14:25:23.704181 2645 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:25:23.704332 kubelet[2645]: I1213 14:25:23.704209 2645 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:25:23.704332 kubelet[2645]: I1213 14:25:23.704320 2645 policy_none.go:49] "None policy: Start" Dec 13 14:25:23.705698 kubelet[2645]: I1213 14:25:23.705679 2645 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:25:23.705830 kubelet[2645]: I1213 14:25:23.705820 2645 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:25:23.706087 kubelet[2645]: I1213 14:25:23.706076 2645 state_mem.go:75] "Updated machine memory state" Dec 13 14:25:23.711000 audit[2645]: AVC avc: denied { mac_admin } for pid=2645 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.711000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:23.711000 audit[2645]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c5d950 a1=c000e12480 a2=c000c5d920 a3=25 items=0 ppid=1 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:23.711000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:23.713024 kubelet[2645]: I1213 14:25:23.711908 2645 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:25:23.713024 kubelet[2645]: I1213 14:25:23.712125 2645 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:25:23.714617 kubelet[2645]: I1213 14:25:23.714297 2645 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:25:23.832130 kubelet[2645]: I1213 14:25:23.832105 2645 topology_manager.go:215] "Topology Admit Handler" podUID="dc7f987257afad4fc360a926281ebc6d" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-28-110" Dec 13 14:25:23.832698 kubelet[2645]: I1213 14:25:23.832675 2645 topology_manager.go:215] "Topology Admit Handler" podUID="77701a1a819666d22b13f78b541aa62f" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:23.833039 kubelet[2645]: I1213 14:25:23.833025 2645 topology_manager.go:215] "Topology Admit Handler" podUID="9330d39c14110a1f69e5839e4c56fce4" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-28-110" Dec 13 14:25:23.855379 kubelet[2645]: E1213 14:25:23.855343 2645 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-28-110\" already exists" pod="kube-system/kube-apiserver-ip-172-31-28-110" Dec 13 14:25:23.856915 kubelet[2645]: E1213 14:25:23.856707 2645 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-28-110\" already exists" pod="kube-system/kube-scheduler-ip-172-31-28-110" Dec 13 14:25:23.859030 kubelet[2645]: E1213 14:25:23.858655 2645 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-28-110\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:23.943128 kubelet[2645]: I1213 14:25:23.943087 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9330d39c14110a1f69e5839e4c56fce4-kubeconfig\") pod \"kube-scheduler-ip-172-31-28-110\" (UID: \"9330d39c14110a1f69e5839e4c56fce4\") " pod="kube-system/kube-scheduler-ip-172-31-28-110" Dec 13 14:25:23.943372 kubelet[2645]: I1213 14:25:23.943352 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dc7f987257afad4fc360a926281ebc6d-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-28-110\" (UID: \"dc7f987257afad4fc360a926281ebc6d\") " pod="kube-system/kube-apiserver-ip-172-31-28-110" Dec 13 14:25:23.943631 kubelet[2645]: I1213 14:25:23.943555 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/77701a1a819666d22b13f78b541aa62f-ca-certs\") pod \"kube-controller-manager-ip-172-31-28-110\" (UID: \"77701a1a819666d22b13f78b541aa62f\") " pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:23.943631 kubelet[2645]: I1213 14:25:23.943594 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/77701a1a819666d22b13f78b541aa62f-k8s-certs\") pod \"kube-controller-manager-ip-172-31-28-110\" (UID: \"77701a1a819666d22b13f78b541aa62f\") " pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:23.943631 kubelet[2645]: I1213 14:25:23.943624 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/77701a1a819666d22b13f78b541aa62f-kubeconfig\") pod \"kube-controller-manager-ip-172-31-28-110\" (UID: \"77701a1a819666d22b13f78b541aa62f\") " pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:23.943810 kubelet[2645]: I1213 14:25:23.943653 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dc7f987257afad4fc360a926281ebc6d-ca-certs\") pod \"kube-apiserver-ip-172-31-28-110\" (UID: \"dc7f987257afad4fc360a926281ebc6d\") " pod="kube-system/kube-apiserver-ip-172-31-28-110" Dec 13 14:25:23.943810 kubelet[2645]: I1213 14:25:23.943709 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dc7f987257afad4fc360a926281ebc6d-k8s-certs\") pod \"kube-apiserver-ip-172-31-28-110\" (UID: \"dc7f987257afad4fc360a926281ebc6d\") " pod="kube-system/kube-apiserver-ip-172-31-28-110" Dec 13 14:25:23.943810 kubelet[2645]: I1213 14:25:23.943742 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/77701a1a819666d22b13f78b541aa62f-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-28-110\" (UID: \"77701a1a819666d22b13f78b541aa62f\") " pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:23.943810 kubelet[2645]: I1213 14:25:23.943782 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/77701a1a819666d22b13f78b541aa62f-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-28-110\" (UID: \"77701a1a819666d22b13f78b541aa62f\") " pod="kube-system/kube-controller-manager-ip-172-31-28-110" Dec 13 14:25:24.469131 kubelet[2645]: I1213 14:25:24.469088 2645 apiserver.go:52] "Watching apiserver" Dec 13 14:25:24.504300 kubelet[2645]: I1213 14:25:24.504248 2645 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:25:24.677866 kubelet[2645]: E1213 14:25:24.677785 2645 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-28-110\" already exists" pod="kube-system/kube-apiserver-ip-172-31-28-110" Dec 13 14:25:24.743177 kubelet[2645]: I1213 14:25:24.743063 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-28-110" podStartSLOduration=6.742989974 podStartE2EDuration="6.742989974s" podCreationTimestamp="2024-12-13 14:25:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:25:24.727140055 +0000 UTC m=+1.509354887" watchObservedRunningTime="2024-12-13 14:25:24.742989974 +0000 UTC m=+1.525204805" Dec 13 14:25:24.767369 kubelet[2645]: I1213 14:25:24.767297 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-28-110" podStartSLOduration=5.767210596 podStartE2EDuration="5.767210596s" podCreationTimestamp="2024-12-13 14:25:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:25:24.744065859 +0000 UTC m=+1.526280691" watchObservedRunningTime="2024-12-13 14:25:24.767210596 +0000 UTC m=+1.549425434" Dec 13 14:25:24.796512 kubelet[2645]: I1213 14:25:24.796388 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-28-110" podStartSLOduration=4.79633486 podStartE2EDuration="4.79633486s" podCreationTimestamp="2024-12-13 14:25:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:25:24.768303035 +0000 UTC m=+1.550517866" watchObservedRunningTime="2024-12-13 14:25:24.79633486 +0000 UTC m=+1.578549694" Dec 13 14:25:24.920919 amazon-ssm-agent[1543]: 2024-12-13 14:25:24 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:25:30.334484 sudo[1848]: pam_unix(sudo:session): session closed for user root Dec 13 14:25:30.333000 audit[1848]: USER_END pid=1848 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:30.335435 kernel: kauditd_printk_skb: 284 callbacks suppressed Dec 13 14:25:30.335494 kernel: audit: type=1106 audit(1734099930.333:820): pid=1848 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:30.337000 audit[1848]: CRED_DISP pid=1848 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:30.342888 kernel: audit: type=1104 audit(1734099930.337:821): pid=1848 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:30.365949 sshd[1845]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:30.367000 audit[1845]: USER_END pid=1845 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:25:30.370311 systemd[1]: sshd@6-172.31.28.110:22-139.178.89.65:51072.service: Deactivated successfully. Dec 13 14:25:30.371233 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:25:30.371389 systemd[1]: session-7.scope: Consumed 5.840s CPU time. Dec 13 14:25:30.367000 audit[1845]: CRED_DISP pid=1845 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:25:30.373466 systemd-logind[1556]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:25:30.377509 kernel: audit: type=1106 audit(1734099930.367:822): pid=1845 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:25:30.377628 kernel: audit: type=1104 audit(1734099930.367:823): pid=1845 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:25:30.377862 kernel: audit: type=1131 audit(1734099930.367:824): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.110:22-139.178.89.65:51072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:30.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.110:22-139.178.89.65:51072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:30.380327 systemd-logind[1556]: Removed session 7. Dec 13 14:25:33.873000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:25:33.873000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001007900 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:25:33.886947 kernel: audit: type=1400 audit(1734099933.873:825): avc: denied { watch } for pid=2405 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:25:33.887097 kernel: audit: type=1300 audit(1734099933.873:825): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001007900 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:25:33.873000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:33.895982 kernel: audit: type=1327 audit(1734099933.873:825): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:34.624852 kubelet[2645]: I1213 14:25:34.624819 2645 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:25:34.625722 env[1563]: time="2024-12-13T14:25:34.625682175Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:25:34.626535 kubelet[2645]: I1213 14:25:34.626512 2645 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:25:35.432324 kubelet[2645]: I1213 14:25:35.432277 2645 topology_manager.go:215] "Topology Admit Handler" podUID="460581e1-843e-426e-8ecc-e49deba42fb7" podNamespace="kube-system" podName="kube-proxy-mjjd7" Dec 13 14:25:35.444287 systemd[1]: Created slice kubepods-besteffort-pod460581e1_843e_426e_8ecc_e49deba42fb7.slice. Dec 13 14:25:35.546191 kubelet[2645]: I1213 14:25:35.546151 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/460581e1-843e-426e-8ecc-e49deba42fb7-lib-modules\") pod \"kube-proxy-mjjd7\" (UID: \"460581e1-843e-426e-8ecc-e49deba42fb7\") " pod="kube-system/kube-proxy-mjjd7" Dec 13 14:25:35.546462 kubelet[2645]: I1213 14:25:35.546201 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fjpbv\" (UniqueName: \"kubernetes.io/projected/460581e1-843e-426e-8ecc-e49deba42fb7-kube-api-access-fjpbv\") pod \"kube-proxy-mjjd7\" (UID: \"460581e1-843e-426e-8ecc-e49deba42fb7\") " pod="kube-system/kube-proxy-mjjd7" Dec 13 14:25:35.546462 kubelet[2645]: I1213 14:25:35.546233 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/460581e1-843e-426e-8ecc-e49deba42fb7-kube-proxy\") pod \"kube-proxy-mjjd7\" (UID: \"460581e1-843e-426e-8ecc-e49deba42fb7\") " pod="kube-system/kube-proxy-mjjd7" Dec 13 14:25:35.546462 kubelet[2645]: I1213 14:25:35.546266 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/460581e1-843e-426e-8ecc-e49deba42fb7-xtables-lock\") pod \"kube-proxy-mjjd7\" (UID: \"460581e1-843e-426e-8ecc-e49deba42fb7\") " pod="kube-system/kube-proxy-mjjd7" Dec 13 14:25:35.760370 env[1563]: time="2024-12-13T14:25:35.759677909Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mjjd7,Uid:460581e1-843e-426e-8ecc-e49deba42fb7,Namespace:kube-system,Attempt:0,}" Dec 13 14:25:35.788745 kubelet[2645]: I1213 14:25:35.788712 2645 topology_manager.go:215] "Topology Admit Handler" podUID="c9edfcaf-4180-45f8-a0c3-9cc146dad048" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-rq6gs" Dec 13 14:25:35.800319 systemd[1]: Created slice kubepods-besteffort-podc9edfcaf_4180_45f8_a0c3_9cc146dad048.slice. Dec 13 14:25:35.821563 env[1563]: time="2024-12-13T14:25:35.818470639Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:35.821563 env[1563]: time="2024-12-13T14:25:35.818721435Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:35.821563 env[1563]: time="2024-12-13T14:25:35.818787598Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:35.821563 env[1563]: time="2024-12-13T14:25:35.819051655Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f79d5224326ab1f44f6c916e4e8fb1acd5b69f065f5765682f029778eef7647 pid=2727 runtime=io.containerd.runc.v2 Dec 13 14:25:35.849586 kubelet[2645]: I1213 14:25:35.849461 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xdhgt\" (UniqueName: \"kubernetes.io/projected/c9edfcaf-4180-45f8-a0c3-9cc146dad048-kube-api-access-xdhgt\") pod \"tigera-operator-c7ccbd65-rq6gs\" (UID: \"c9edfcaf-4180-45f8-a0c3-9cc146dad048\") " pod="tigera-operator/tigera-operator-c7ccbd65-rq6gs" Dec 13 14:25:35.849586 kubelet[2645]: I1213 14:25:35.849523 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c9edfcaf-4180-45f8-a0c3-9cc146dad048-var-lib-calico\") pod \"tigera-operator-c7ccbd65-rq6gs\" (UID: \"c9edfcaf-4180-45f8-a0c3-9cc146dad048\") " pod="tigera-operator/tigera-operator-c7ccbd65-rq6gs" Dec 13 14:25:35.856684 systemd[1]: Started cri-containerd-1f79d5224326ab1f44f6c916e4e8fb1acd5b69f065f5765682f029778eef7647.scope. Dec 13 14:25:35.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.881546 kernel: audit: type=1400 audit(1734099935.873:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.881656 kernel: audit: type=1400 audit(1734099935.873:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.881721 kernel: audit: type=1400 audit(1734099935.873:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.886031 kernel: audit: type=1400 audit(1734099935.873:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.892609 kernel: audit: type=1400 audit(1734099935.873:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.897943 kernel: audit: type=1400 audit(1734099935.873:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.903768 kernel: audit: type=1400 audit(1734099935.873:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.918393 kernel: audit: type=1400 audit(1734099935.873:833): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.918530 kernel: audit: type=1400 audit(1734099935.873:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.922096 env[1563]: time="2024-12-13T14:25:35.919296280Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mjjd7,Uid:460581e1-843e-426e-8ecc-e49deba42fb7,Namespace:kube-system,Attempt:0,} returns sandbox id \"1f79d5224326ab1f44f6c916e4e8fb1acd5b69f065f5765682f029778eef7647\"" Dec 13 14:25:35.873000 audit: BPF prog-id=106 op=LOAD Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2727 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:35.922690 kernel: audit: type=1400 audit(1734099935.873:835): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166373964353232343332366162316634346636633931366534653866 Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2727 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:35.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166373964353232343332366162316634346636633931366534653866 Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.923710 env[1563]: time="2024-12-13T14:25:35.923654265Z" level=info msg="CreateContainer within sandbox \"1f79d5224326ab1f44f6c916e4e8fb1acd5b69f065f5765682f029778eef7647\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.877000 audit: BPF prog-id=107 op=LOAD Dec 13 14:25:35.877000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001cc550 items=0 ppid=2727 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:35.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166373964353232343332366162316634346636633931366534653866 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit: BPF prog-id=108 op=LOAD Dec 13 14:25:35.888000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001cc598 items=0 ppid=2727 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:35.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166373964353232343332366162316634346636633931366534653866 Dec 13 14:25:35.888000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:25:35.888000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:35.888000 audit: BPF prog-id=109 op=LOAD Dec 13 14:25:35.888000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001cc9a8 items=0 ppid=2727 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:35.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166373964353232343332366162316634346636633931366534653866 Dec 13 14:25:35.946872 env[1563]: time="2024-12-13T14:25:35.946816979Z" level=info msg="CreateContainer within sandbox \"1f79d5224326ab1f44f6c916e4e8fb1acd5b69f065f5765682f029778eef7647\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2394146fe4a9494663183bf7978e3ea24fb06c3d6f63c51252a69844d8d3dd68\"" Dec 13 14:25:35.947616 env[1563]: time="2024-12-13T14:25:35.947579685Z" level=info msg="StartContainer for \"2394146fe4a9494663183bf7978e3ea24fb06c3d6f63c51252a69844d8d3dd68\"" Dec 13 14:25:35.987985 systemd[1]: Started cri-containerd-2394146fe4a9494663183bf7978e3ea24fb06c3d6f63c51252a69844d8d3dd68.scope. Dec 13 14:25:36.012000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.012000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f346039d7a8 items=0 ppid=2727 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393431343666653461393439343636333138336266373937386533 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit: BPF prog-id=110 op=LOAD Dec 13 14:25:36.013000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000208c58 items=0 ppid=2727 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393431343666653461393439343636333138336266373937386533 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit: BPF prog-id=111 op=LOAD Dec 13 14:25:36.013000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000208ca8 items=0 ppid=2727 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393431343666653461393439343636333138336266373937386533 Dec 13 14:25:36.013000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:25:36.013000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { perfmon } for pid=2771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit[2771]: AVC avc: denied { bpf } for pid=2771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.013000 audit: BPF prog-id=112 op=LOAD Dec 13 14:25:36.013000 audit[2771]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000208d38 items=0 ppid=2727 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393431343666653461393439343636333138336266373937386533 Dec 13 14:25:36.032911 env[1563]: time="2024-12-13T14:25:36.032872152Z" level=info msg="StartContainer for \"2394146fe4a9494663183bf7978e3ea24fb06c3d6f63c51252a69844d8d3dd68\" returns successfully" Dec 13 14:25:36.114215 env[1563]: time="2024-12-13T14:25:36.114168600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-rq6gs,Uid:c9edfcaf-4180-45f8-a0c3-9cc146dad048,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:25:36.137277 env[1563]: time="2024-12-13T14:25:36.137194524Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:36.137277 env[1563]: time="2024-12-13T14:25:36.137245709Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:36.137640 env[1563]: time="2024-12-13T14:25:36.137260879Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:36.138073 env[1563]: time="2024-12-13T14:25:36.137809041Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/258a943d57c3391bb426e0937ac3b880d422cd6bb0c425e381a7124062573f87 pid=2804 runtime=io.containerd.runc.v2 Dec 13 14:25:36.157819 systemd[1]: Started cri-containerd-258a943d57c3391bb426e0937ac3b880d422cd6bb0c425e381a7124062573f87.scope. Dec 13 14:25:36.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.176000 audit: BPF prog-id=113 op=LOAD Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2804 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235386139343364353763333339316262343236653039333761633362 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2804 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235386139343364353763333339316262343236653039333761633362 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit: BPF prog-id=114 op=LOAD Dec 13 14:25:36.177000 audit[2812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000267ce0 items=0 ppid=2804 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235386139343364353763333339316262343236653039333761633362 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit: BPF prog-id=115 op=LOAD Dec 13 14:25:36.177000 audit[2812]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000267d28 items=0 ppid=2804 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235386139343364353763333339316262343236653039333761633362 Dec 13 14:25:36.177000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:25:36.177000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { perfmon } for pid=2812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit[2812]: AVC avc: denied { bpf } for pid=2812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.177000 audit: BPF prog-id=116 op=LOAD Dec 13 14:25:36.177000 audit[2812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ea138 items=0 ppid=2804 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235386139343364353763333339316262343236653039333761633362 Dec 13 14:25:36.226156 env[1563]: time="2024-12-13T14:25:36.224940166Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-rq6gs,Uid:c9edfcaf-4180-45f8-a0c3-9cc146dad048,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"258a943d57c3391bb426e0937ac3b880d422cd6bb0c425e381a7124062573f87\"" Dec 13 14:25:36.229077 env[1563]: time="2024-12-13T14:25:36.227345708Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:25:36.591000 audit[2863]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.591000 audit[2863]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe314a79c0 a2=0 a3=7ffe314a79ac items=0 ppid=2781 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:25:36.593000 audit[2864]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.593000 audit[2864]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce4d4a930 a2=0 a3=7ffce4d4a91c items=0 ppid=2781 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.593000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:25:36.593000 audit[2865]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.593000 audit[2865]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe09941960 a2=0 a3=7ffe0994194c items=0 ppid=2781 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:25:36.595000 audit[2866]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.595000 audit[2866]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2a55c890 a2=0 a3=7ffe2a55c87c items=0 ppid=2781 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:25:36.596000 audit[2867]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.596000 audit[2867]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce73bf860 a2=0 a3=7ffce73bf84c items=0 ppid=2781 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.596000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:25:36.598000 audit[2868]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.598000 audit[2868]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7af6af50 a2=0 a3=7ffc7af6af3c items=0 ppid=2781 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:25:36.703524 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount956153771.mount: Deactivated successfully. Dec 13 14:25:36.722625 kubelet[2645]: I1213 14:25:36.722586 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-mjjd7" podStartSLOduration=1.7214612009999999 podStartE2EDuration="1.721461201s" podCreationTimestamp="2024-12-13 14:25:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:25:36.7206994 +0000 UTC m=+13.502914229" watchObservedRunningTime="2024-12-13 14:25:36.721461201 +0000 UTC m=+13.503676031" Dec 13 14:25:36.735000 audit[2869]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2869 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.735000 audit[2869]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe3007e8a0 a2=0 a3=7ffe3007e88c items=0 ppid=2781 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:25:36.740000 audit[2871]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2871 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.740000 audit[2871]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff1be6e1d0 a2=0 a3=7fff1be6e1bc items=0 ppid=2781 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:25:36.745000 audit[2874]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.745000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff885f9ea0 a2=0 a3=7fff885f9e8c items=0 ppid=2781 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:25:36.747000 audit[2875]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.747000 audit[2875]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8b817750 a2=0 a3=7fff8b81773c items=0 ppid=2781 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:25:36.750000 audit[2877]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.750000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff30462100 a2=0 a3=7fff304620ec items=0 ppid=2781 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:25:36.751000 audit[2878]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.751000 audit[2878]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe69412b00 a2=0 a3=7ffe69412aec items=0 ppid=2781 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:25:36.754000 audit[2880]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2880 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.754000 audit[2880]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe020bf4c0 a2=0 a3=7ffe020bf4ac items=0 ppid=2781 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:25:36.760000 audit[2883]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.760000 audit[2883]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc5b6e5d50 a2=0 a3=7ffc5b6e5d3c items=0 ppid=2781 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:25:36.762000 audit[2884]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2884 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.762000 audit[2884]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1bf53310 a2=0 a3=7ffd1bf532fc items=0 ppid=2781 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:25:36.766000 audit[2886]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.766000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffaa35c310 a2=0 a3=7fffaa35c2fc items=0 ppid=2781 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:25:36.767000 audit[2887]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.767000 audit[2887]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc041ebee0 a2=0 a3=7ffc041ebecc items=0 ppid=2781 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.767000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:25:36.770000 audit[2889]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.770000 audit[2889]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd81ffcd0 a2=0 a3=7ffcd81ffcbc items=0 ppid=2781 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:25:36.775000 audit[2892]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.775000 audit[2892]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb78222f0 a2=0 a3=7ffdb78222dc items=0 ppid=2781 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:25:36.780000 audit[2895]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2895 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.780000 audit[2895]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce86b4750 a2=0 a3=7ffce86b473c items=0 ppid=2781 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:25:36.781000 audit[2896]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.781000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffccf52c5e0 a2=0 a3=7ffccf52c5cc items=0 ppid=2781 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:25:36.785000 audit[2898]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.785000 audit[2898]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe8724e0d0 a2=0 a3=7ffe8724e0bc items=0 ppid=2781 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:25:36.789000 audit[2901]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.789000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb518ed20 a2=0 a3=7ffeb518ed0c items=0 ppid=2781 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:25:36.790000 audit[2902]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.790000 audit[2902]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2a40ddb0 a2=0 a3=7ffd2a40dd9c items=0 ppid=2781 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:25:36.794000 audit[2904]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:36.794000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe6e0fbcf0 a2=0 a3=7ffe6e0fbcdc items=0 ppid=2781 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:25:36.824000 audit[2910]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:36.824000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc230e1410 a2=0 a3=7ffc230e13fc items=0 ppid=2781 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:36.879000 audit[2910]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:36.879000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc230e1410 a2=0 a3=7ffc230e13fc items=0 ppid=2781 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:36.882000 audit[2915]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2915 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.882000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd17c5bba0 a2=0 a3=7ffd17c5bb8c items=0 ppid=2781 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:25:36.885000 audit[2917]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.885000 audit[2917]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffcbef48e0 a2=0 a3=7fffcbef48cc items=0 ppid=2781 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.885000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:25:36.889000 audit[2920]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.889000 audit[2920]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcf23bd890 a2=0 a3=7ffcf23bd87c items=0 ppid=2781 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:25:36.891000 audit[2921]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.891000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd596be950 a2=0 a3=7ffd596be93c items=0 ppid=2781 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:25:36.894000 audit[2923]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.894000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd52b45390 a2=0 a3=7ffd52b4537c items=0 ppid=2781 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:25:36.895000 audit[2924]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2924 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.895000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcac4239f0 a2=0 a3=7ffcac4239dc items=0 ppid=2781 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:25:36.898000 audit[2926]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.898000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff8da7c9e0 a2=0 a3=7fff8da7c9cc items=0 ppid=2781 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.898000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:25:36.902000 audit[2929]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.902000 audit[2929]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcd042cf10 a2=0 a3=7ffcd042cefc items=0 ppid=2781 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:25:36.904000 audit[2930]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.904000 audit[2930]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1b3402c0 a2=0 a3=7fff1b3402ac items=0 ppid=2781 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:25:36.907000 audit[2932]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.907000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce53d04e0 a2=0 a3=7ffce53d04cc items=0 ppid=2781 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:25:36.908000 audit[2933]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.908000 audit[2933]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce31a9740 a2=0 a3=7ffce31a972c items=0 ppid=2781 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:25:36.912000 audit[2935]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.912000 audit[2935]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb467abe0 a2=0 a3=7ffeb467abcc items=0 ppid=2781 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:25:36.916000 audit[2938]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.916000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5ae19000 a2=0 a3=7ffe5ae18fec items=0 ppid=2781 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.916000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:25:36.936000 audit[2941]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.936000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb770efd0 a2=0 a3=7fffb770efbc items=0 ppid=2781 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.936000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:25:36.943000 audit[2942]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2942 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.943000 audit[2942]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe852f8d0 a2=0 a3=7fffe852f8bc items=0 ppid=2781 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:25:36.955000 audit[2944]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2944 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.955000 audit[2944]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffec41dcd70 a2=0 a3=7ffec41dcd5c items=0 ppid=2781 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.955000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:25:36.960000 audit[2947]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.960000 audit[2947]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd1b150650 a2=0 a3=7ffd1b15063c items=0 ppid=2781 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:25:36.961000 audit[2948]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.961000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff14257640 a2=0 a3=7fff1425762c items=0 ppid=2781 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:25:36.964000 audit[2950]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.964000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdf4578080 a2=0 a3=7ffdf457806c items=0 ppid=2781 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:25:36.966000 audit[2951]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.966000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec488fca0 a2=0 a3=7ffec488fc8c items=0 ppid=2781 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:25:36.969000 audit[2953]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.969000 audit[2953]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0af498f0 a2=0 a3=7ffd0af498dc items=0 ppid=2781 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.969000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:25:36.973000 audit[2956]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:36.973000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff63d79b50 a2=0 a3=7fff63d79b3c items=0 ppid=2781 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:25:36.979000 audit[2958]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:25:36.979000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffdcde93e10 a2=0 a3=7ffdcde93dfc items=0 ppid=2781 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.979000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:36.980000 audit[2958]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:25:36.980000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdcde93e10 a2=0 a3=7ffdcde93dfc items=0 ppid=2781 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.980000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:38.713217 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount139405641.mount: Deactivated successfully. Dec 13 14:25:39.879563 env[1563]: time="2024-12-13T14:25:39.879520918Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:39.881775 env[1563]: time="2024-12-13T14:25:39.881737711Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:39.883937 env[1563]: time="2024-12-13T14:25:39.883902060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:39.885766 env[1563]: time="2024-12-13T14:25:39.885726895Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:39.886741 env[1563]: time="2024-12-13T14:25:39.886626110Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:25:39.890401 env[1563]: time="2024-12-13T14:25:39.890361332Z" level=info msg="CreateContainer within sandbox \"258a943d57c3391bb426e0937ac3b880d422cd6bb0c425e381a7124062573f87\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:25:39.905254 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount935493695.mount: Deactivated successfully. Dec 13 14:25:39.913626 env[1563]: time="2024-12-13T14:25:39.913573627Z" level=info msg="CreateContainer within sandbox \"258a943d57c3391bb426e0937ac3b880d422cd6bb0c425e381a7124062573f87\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"9bdfc2c9f7858b2c93e36fd2669257ebc020e5ec66337888a9bfcfa0243b6b50\"" Dec 13 14:25:39.915906 env[1563]: time="2024-12-13T14:25:39.915854484Z" level=info msg="StartContainer for \"9bdfc2c9f7858b2c93e36fd2669257ebc020e5ec66337888a9bfcfa0243b6b50\"" Dec 13 14:25:39.957992 systemd[1]: Started cri-containerd-9bdfc2c9f7858b2c93e36fd2669257ebc020e5ec66337888a9bfcfa0243b6b50.scope. Dec 13 14:25:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.977000 audit: BPF prog-id=117 op=LOAD Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=2804 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962646663326339663738353862326339336533366664323636393235 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=8 items=0 ppid=2804 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962646663326339663738353862326339336533366664323636393235 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit: BPF prog-id=118 op=LOAD Dec 13 14:25:39.980000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c000255fa0 items=0 ppid=2804 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962646663326339663738353862326339336533366664323636393235 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit: BPF prog-id=119 op=LOAD Dec 13 14:25:39.980000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c000255fe8 items=0 ppid=2804 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962646663326339663738353862326339336533366664323636393235 Dec 13 14:25:39.980000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:25:39.980000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { perfmon } for pid=2965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit[2965]: AVC avc: denied { bpf } for pid=2965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:39.980000 audit: BPF prog-id=120 op=LOAD Dec 13 14:25:39.980000 audit[2965]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c0003263f8 items=0 ppid=2804 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962646663326339663738353862326339336533366664323636393235 Dec 13 14:25:40.000621 env[1563]: time="2024-12-13T14:25:40.000549749Z" level=info msg="StartContainer for \"9bdfc2c9f7858b2c93e36fd2669257ebc020e5ec66337888a9bfcfa0243b6b50\" returns successfully" Dec 13 14:25:43.481000 audit[3000]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:43.483888 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 14:25:43.484004 kernel: audit: type=1325 audit(1734099943.481:937): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:43.481000 audit[3000]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe82808070 a2=0 a3=7ffe8280805c items=0 ppid=2781 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:43.493535 kernel: audit: type=1300 audit(1734099943.481:937): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe82808070 a2=0 a3=7ffe8280805c items=0 ppid=2781 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:43.493692 kernel: audit: type=1327 audit(1734099943.481:937): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:43.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:43.496000 audit[3000]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:43.502695 kernel: audit: type=1325 audit(1734099943.496:938): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:43.496000 audit[3000]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe82808070 a2=0 a3=0 items=0 ppid=2781 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:43.511687 kernel: audit: type=1300 audit(1734099943.496:938): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe82808070 a2=0 a3=0 items=0 ppid=2781 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:43.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:43.519686 kernel: audit: type=1327 audit(1734099943.496:938): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:43.520000 audit[3002]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:43.520000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe5a7bf200 a2=0 a3=7ffe5a7bf1ec items=0 ppid=2781 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:43.529746 kernel: audit: type=1325 audit(1734099943.520:939): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:43.529974 kernel: audit: type=1300 audit(1734099943.520:939): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe5a7bf200 a2=0 a3=7ffe5a7bf1ec items=0 ppid=2781 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:43.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:43.533000 audit[3002]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:43.538028 kernel: audit: type=1327 audit(1734099943.520:939): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:43.538233 kernel: audit: type=1325 audit(1734099943.533:940): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:43.533000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe5a7bf200 a2=0 a3=0 items=0 ppid=2781 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:43.533000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:43.710011 kubelet[2645]: I1213 14:25:43.709965 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-rq6gs" podStartSLOduration=5.049546472 podStartE2EDuration="8.709910595s" podCreationTimestamp="2024-12-13 14:25:35 +0000 UTC" firstStartedPulling="2024-12-13 14:25:36.226721128 +0000 UTC m=+13.008935941" lastFinishedPulling="2024-12-13 14:25:39.887085241 +0000 UTC m=+16.669300064" observedRunningTime="2024-12-13 14:25:40.740229943 +0000 UTC m=+17.522444772" watchObservedRunningTime="2024-12-13 14:25:43.709910595 +0000 UTC m=+20.492125484" Dec 13 14:25:43.710956 kubelet[2645]: I1213 14:25:43.710891 2645 topology_manager.go:215] "Topology Admit Handler" podUID="e1bbe40e-d794-48ee-b675-46a402cd26ba" podNamespace="calico-system" podName="calico-typha-6bf69b695d-b5rc5" Dec 13 14:25:43.720294 systemd[1]: Created slice kubepods-besteffort-pode1bbe40e_d794_48ee_b675_46a402cd26ba.slice. Dec 13 14:25:43.822368 kubelet[2645]: I1213 14:25:43.822183 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2vnns\" (UniqueName: \"kubernetes.io/projected/e1bbe40e-d794-48ee-b675-46a402cd26ba-kube-api-access-2vnns\") pod \"calico-typha-6bf69b695d-b5rc5\" (UID: \"e1bbe40e-d794-48ee-b675-46a402cd26ba\") " pod="calico-system/calico-typha-6bf69b695d-b5rc5" Dec 13 14:25:43.822368 kubelet[2645]: I1213 14:25:43.822309 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e1bbe40e-d794-48ee-b675-46a402cd26ba-tigera-ca-bundle\") pod \"calico-typha-6bf69b695d-b5rc5\" (UID: \"e1bbe40e-d794-48ee-b675-46a402cd26ba\") " pod="calico-system/calico-typha-6bf69b695d-b5rc5" Dec 13 14:25:43.822579 kubelet[2645]: I1213 14:25:43.822380 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e1bbe40e-d794-48ee-b675-46a402cd26ba-typha-certs\") pod \"calico-typha-6bf69b695d-b5rc5\" (UID: \"e1bbe40e-d794-48ee-b675-46a402cd26ba\") " pod="calico-system/calico-typha-6bf69b695d-b5rc5" Dec 13 14:25:44.004742 kubelet[2645]: I1213 14:25:44.004625 2645 topology_manager.go:215] "Topology Admit Handler" podUID="bd5951ce-4283-494a-a266-af361315407b" podNamespace="calico-system" podName="calico-node-d5xtt" Dec 13 14:25:44.013564 systemd[1]: Created slice kubepods-besteffort-podbd5951ce_4283_494a_a266_af361315407b.slice. Dec 13 14:25:44.025579 env[1563]: time="2024-12-13T14:25:44.025519713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6bf69b695d-b5rc5,Uid:e1bbe40e-d794-48ee-b675-46a402cd26ba,Namespace:calico-system,Attempt:0,}" Dec 13 14:25:44.063149 env[1563]: time="2024-12-13T14:25:44.063065873Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:44.063414 env[1563]: time="2024-12-13T14:25:44.063384893Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:44.063547 env[1563]: time="2024-12-13T14:25:44.063523871Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:44.064643 env[1563]: time="2024-12-13T14:25:44.064597282Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10803c6bab94a0cdac7e7180ea0ed1ecd5517bbcbd59bc32e0127b159addf743 pid=3013 runtime=io.containerd.runc.v2 Dec 13 14:25:44.109840 systemd[1]: Started cri-containerd-10803c6bab94a0cdac7e7180ea0ed1ecd5517bbcbd59bc32e0127b159addf743.scope. Dec 13 14:25:44.124132 kubelet[2645]: I1213 14:25:44.124069 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bd5951ce-4283-494a-a266-af361315407b-var-lib-calico\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.124132 kubelet[2645]: I1213 14:25:44.124134 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/bd5951ce-4283-494a-a266-af361315407b-cni-bin-dir\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.125004 kubelet[2645]: I1213 14:25:44.124163 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/bd5951ce-4283-494a-a266-af361315407b-cni-net-dir\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.125004 kubelet[2645]: I1213 14:25:44.124193 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bd5951ce-4283-494a-a266-af361315407b-xtables-lock\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.125004 kubelet[2645]: I1213 14:25:44.124220 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/bd5951ce-4283-494a-a266-af361315407b-var-run-calico\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.125004 kubelet[2645]: I1213 14:25:44.124246 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/bd5951ce-4283-494a-a266-af361315407b-cni-log-dir\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.125004 kubelet[2645]: I1213 14:25:44.124305 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/bd5951ce-4283-494a-a266-af361315407b-flexvol-driver-host\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.125351 kubelet[2645]: I1213 14:25:44.124543 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rr2cg\" (UniqueName: \"kubernetes.io/projected/bd5951ce-4283-494a-a266-af361315407b-kube-api-access-rr2cg\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.125351 kubelet[2645]: I1213 14:25:44.124678 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/bd5951ce-4283-494a-a266-af361315407b-policysync\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.125351 kubelet[2645]: I1213 14:25:44.124744 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bd5951ce-4283-494a-a266-af361315407b-lib-modules\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.125351 kubelet[2645]: I1213 14:25:44.124791 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bd5951ce-4283-494a-a266-af361315407b-tigera-ca-bundle\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.125351 kubelet[2645]: I1213 14:25:44.124819 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/bd5951ce-4283-494a-a266-af361315407b-node-certs\") pod \"calico-node-d5xtt\" (UID: \"bd5951ce-4283-494a-a266-af361315407b\") " pod="calico-system/calico-node-d5xtt" Dec 13 14:25:44.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.139000 audit: BPF prog-id=121 op=LOAD Dec 13 14:25:44.140000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.140000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3013 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130383033633662616239346130636461633765373138306561306564 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3013 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130383033633662616239346130636461633765373138306561306564 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit: BPF prog-id=122 op=LOAD Dec 13 14:25:44.141000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000302a10 items=0 ppid=3013 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130383033633662616239346130636461633765373138306561306564 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit: BPF prog-id=123 op=LOAD Dec 13 14:25:44.141000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000302a58 items=0 ppid=3013 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130383033633662616239346130636461633765373138306561306564 Dec 13 14:25:44.141000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:25:44.141000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { perfmon } for pid=3022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit[3022]: AVC avc: denied { bpf } for pid=3022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.141000 audit: BPF prog-id=124 op=LOAD Dec 13 14:25:44.141000 audit[3022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000302e68 items=0 ppid=3013 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130383033633662616239346130636461633765373138306561306564 Dec 13 14:25:44.210085 env[1563]: time="2024-12-13T14:25:44.210039515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6bf69b695d-b5rc5,Uid:e1bbe40e-d794-48ee-b675-46a402cd26ba,Namespace:calico-system,Attempt:0,} returns sandbox id \"10803c6bab94a0cdac7e7180ea0ed1ecd5517bbcbd59bc32e0127b159addf743\"" Dec 13 14:25:44.213846 env[1563]: time="2024-12-13T14:25:44.213792229Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:25:44.232103 kubelet[2645]: E1213 14:25:44.232060 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.235368 kubelet[2645]: W1213 14:25:44.235330 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.235509 kubelet[2645]: E1213 14:25:44.235375 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.235777 kubelet[2645]: E1213 14:25:44.235759 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.235870 kubelet[2645]: W1213 14:25:44.235777 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.236026 kubelet[2645]: E1213 14:25:44.235885 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.236096 kubelet[2645]: E1213 14:25:44.236030 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.236096 kubelet[2645]: W1213 14:25:44.236039 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.236096 kubelet[2645]: E1213 14:25:44.236058 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.238686 kubelet[2645]: E1213 14:25:44.236277 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.238686 kubelet[2645]: W1213 14:25:44.236289 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.238686 kubelet[2645]: E1213 14:25:44.236309 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.238686 kubelet[2645]: E1213 14:25:44.236515 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.238686 kubelet[2645]: W1213 14:25:44.236528 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.238686 kubelet[2645]: E1213 14:25:44.236545 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.238686 kubelet[2645]: E1213 14:25:44.236817 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.238686 kubelet[2645]: W1213 14:25:44.236827 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.238686 kubelet[2645]: E1213 14:25:44.236845 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.238686 kubelet[2645]: E1213 14:25:44.237058 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.239214 kubelet[2645]: W1213 14:25:44.237067 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.239214 kubelet[2645]: E1213 14:25:44.237082 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.239214 kubelet[2645]: E1213 14:25:44.237315 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.239214 kubelet[2645]: W1213 14:25:44.237324 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.239214 kubelet[2645]: E1213 14:25:44.237339 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.244079 kubelet[2645]: E1213 14:25:44.244044 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.244079 kubelet[2645]: W1213 14:25:44.244078 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.244278 kubelet[2645]: E1213 14:25:44.244102 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.246878 kubelet[2645]: I1213 14:25:44.246849 2645 topology_manager.go:215] "Topology Admit Handler" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" podNamespace="calico-system" podName="csi-node-driver-s6fcz" Dec 13 14:25:44.252184 kubelet[2645]: E1213 14:25:44.252145 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s6fcz" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" Dec 13 14:25:44.288992 kubelet[2645]: E1213 14:25:44.288951 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.288992 kubelet[2645]: W1213 14:25:44.288985 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.289297 kubelet[2645]: E1213 14:25:44.289013 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.316154 kubelet[2645]: E1213 14:25:44.316120 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.316154 kubelet[2645]: W1213 14:25:44.316148 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.316387 kubelet[2645]: E1213 14:25:44.316177 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.316442 kubelet[2645]: E1213 14:25:44.316416 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.316442 kubelet[2645]: W1213 14:25:44.316426 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.316536 kubelet[2645]: E1213 14:25:44.316443 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.317111 kubelet[2645]: E1213 14:25:44.316735 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.317111 kubelet[2645]: W1213 14:25:44.316752 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.317111 kubelet[2645]: E1213 14:25:44.316868 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.317320 kubelet[2645]: E1213 14:25:44.317150 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.317320 kubelet[2645]: W1213 14:25:44.317179 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.317320 kubelet[2645]: E1213 14:25:44.317199 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.317478 kubelet[2645]: E1213 14:25:44.317460 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.317478 kubelet[2645]: W1213 14:25:44.317471 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.317573 kubelet[2645]: E1213 14:25:44.317486 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.317718 kubelet[2645]: E1213 14:25:44.317686 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.317718 kubelet[2645]: W1213 14:25:44.317700 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.317718 kubelet[2645]: E1213 14:25:44.317715 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.317914 kubelet[2645]: E1213 14:25:44.317899 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.317914 kubelet[2645]: W1213 14:25:44.317913 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.318037 kubelet[2645]: E1213 14:25:44.317929 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.318131 kubelet[2645]: E1213 14:25:44.318118 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.318198 kubelet[2645]: W1213 14:25:44.318132 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.318198 kubelet[2645]: E1213 14:25:44.318146 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.318477 kubelet[2645]: E1213 14:25:44.318451 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.318477 kubelet[2645]: W1213 14:25:44.318467 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.318605 kubelet[2645]: E1213 14:25:44.318484 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.318696 kubelet[2645]: E1213 14:25:44.318684 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.318763 kubelet[2645]: W1213 14:25:44.318697 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.318763 kubelet[2645]: E1213 14:25:44.318711 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.318908 kubelet[2645]: E1213 14:25:44.318894 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.318959 kubelet[2645]: W1213 14:25:44.318909 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.318959 kubelet[2645]: E1213 14:25:44.318927 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.319160 kubelet[2645]: E1213 14:25:44.319127 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.319160 kubelet[2645]: W1213 14:25:44.319137 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.319160 kubelet[2645]: E1213 14:25:44.319152 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.320511 env[1563]: time="2024-12-13T14:25:44.320470298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d5xtt,Uid:bd5951ce-4283-494a-a266-af361315407b,Namespace:calico-system,Attempt:0,}" Dec 13 14:25:44.321454 kubelet[2645]: E1213 14:25:44.321413 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.321537 kubelet[2645]: W1213 14:25:44.321511 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.321590 kubelet[2645]: E1213 14:25:44.321551 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.322891 kubelet[2645]: E1213 14:25:44.322863 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.322891 kubelet[2645]: W1213 14:25:44.322880 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.323111 kubelet[2645]: E1213 14:25:44.322918 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.323702 kubelet[2645]: E1213 14:25:44.323683 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.323702 kubelet[2645]: W1213 14:25:44.323702 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.325216 kubelet[2645]: E1213 14:25:44.323738 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.325216 kubelet[2645]: E1213 14:25:44.324169 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.325216 kubelet[2645]: W1213 14:25:44.324180 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.325216 kubelet[2645]: E1213 14:25:44.324200 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.325216 kubelet[2645]: E1213 14:25:44.324824 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.325216 kubelet[2645]: W1213 14:25:44.324835 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.325216 kubelet[2645]: E1213 14:25:44.324854 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.325572 kubelet[2645]: E1213 14:25:44.325227 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.325572 kubelet[2645]: W1213 14:25:44.325238 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.325572 kubelet[2645]: E1213 14:25:44.325255 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.325572 kubelet[2645]: E1213 14:25:44.325567 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.325776 kubelet[2645]: W1213 14:25:44.325579 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.325776 kubelet[2645]: E1213 14:25:44.325596 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.325864 kubelet[2645]: E1213 14:25:44.325807 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.325864 kubelet[2645]: W1213 14:25:44.325816 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.325864 kubelet[2645]: E1213 14:25:44.325831 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.326746 kubelet[2645]: E1213 14:25:44.326728 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.326746 kubelet[2645]: W1213 14:25:44.326745 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.326881 kubelet[2645]: E1213 14:25:44.326762 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.326881 kubelet[2645]: I1213 14:25:44.326801 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/797ccd89-3053-4e0b-b83c-d48e6ae1f519-kubelet-dir\") pod \"csi-node-driver-s6fcz\" (UID: \"797ccd89-3053-4e0b-b83c-d48e6ae1f519\") " pod="calico-system/csi-node-driver-s6fcz" Dec 13 14:25:44.327084 kubelet[2645]: E1213 14:25:44.327067 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.327165 kubelet[2645]: W1213 14:25:44.327084 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.327165 kubelet[2645]: E1213 14:25:44.327130 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.327477 kubelet[2645]: I1213 14:25:44.327405 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/797ccd89-3053-4e0b-b83c-d48e6ae1f519-varrun\") pod \"csi-node-driver-s6fcz\" (UID: \"797ccd89-3053-4e0b-b83c-d48e6ae1f519\") " pod="calico-system/csi-node-driver-s6fcz" Dec 13 14:25:44.327759 kubelet[2645]: E1213 14:25:44.327742 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.327759 kubelet[2645]: W1213 14:25:44.327759 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.327961 kubelet[2645]: E1213 14:25:44.327781 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.328857 kubelet[2645]: E1213 14:25:44.328840 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.328857 kubelet[2645]: W1213 14:25:44.328857 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.328990 kubelet[2645]: E1213 14:25:44.328952 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.329428 kubelet[2645]: E1213 14:25:44.329409 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.329428 kubelet[2645]: W1213 14:25:44.329426 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.329549 kubelet[2645]: E1213 14:25:44.329541 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.329603 kubelet[2645]: I1213 14:25:44.329576 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/797ccd89-3053-4e0b-b83c-d48e6ae1f519-socket-dir\") pod \"csi-node-driver-s6fcz\" (UID: \"797ccd89-3053-4e0b-b83c-d48e6ae1f519\") " pod="calico-system/csi-node-driver-s6fcz" Dec 13 14:25:44.329821 kubelet[2645]: E1213 14:25:44.329805 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.329821 kubelet[2645]: W1213 14:25:44.329820 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.329951 kubelet[2645]: E1213 14:25:44.329840 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.330546 kubelet[2645]: E1213 14:25:44.330147 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.330546 kubelet[2645]: W1213 14:25:44.330163 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.331108 kubelet[2645]: E1213 14:25:44.331084 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.331340 kubelet[2645]: E1213 14:25:44.331321 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.331340 kubelet[2645]: W1213 14:25:44.331339 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.331452 kubelet[2645]: E1213 14:25:44.331360 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.331452 kubelet[2645]: I1213 14:25:44.331391 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g62z6\" (UniqueName: \"kubernetes.io/projected/797ccd89-3053-4e0b-b83c-d48e6ae1f519-kube-api-access-g62z6\") pod \"csi-node-driver-s6fcz\" (UID: \"797ccd89-3053-4e0b-b83c-d48e6ae1f519\") " pod="calico-system/csi-node-driver-s6fcz" Dec 13 14:25:44.331784 kubelet[2645]: E1213 14:25:44.331765 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.331938 kubelet[2645]: W1213 14:25:44.331784 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.332268 kubelet[2645]: E1213 14:25:44.332238 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.332349 kubelet[2645]: I1213 14:25:44.332281 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/797ccd89-3053-4e0b-b83c-d48e6ae1f519-registration-dir\") pod \"csi-node-driver-s6fcz\" (UID: \"797ccd89-3053-4e0b-b83c-d48e6ae1f519\") " pod="calico-system/csi-node-driver-s6fcz" Dec 13 14:25:44.332459 kubelet[2645]: E1213 14:25:44.332444 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.332512 kubelet[2645]: W1213 14:25:44.332463 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.332721 kubelet[2645]: E1213 14:25:44.332705 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.332902 kubelet[2645]: E1213 14:25:44.332887 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.333016 kubelet[2645]: W1213 14:25:44.332903 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.333016 kubelet[2645]: E1213 14:25:44.332923 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.339380 kubelet[2645]: E1213 14:25:44.339272 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.339380 kubelet[2645]: W1213 14:25:44.339296 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.339380 kubelet[2645]: E1213 14:25:44.339330 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.339657 kubelet[2645]: E1213 14:25:44.339549 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.339657 kubelet[2645]: W1213 14:25:44.339560 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.339657 kubelet[2645]: E1213 14:25:44.339576 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.340050 kubelet[2645]: E1213 14:25:44.340008 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.340050 kubelet[2645]: W1213 14:25:44.340021 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.340050 kubelet[2645]: E1213 14:25:44.340039 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.340268 kubelet[2645]: E1213 14:25:44.340250 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.340268 kubelet[2645]: W1213 14:25:44.340267 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.340365 kubelet[2645]: E1213 14:25:44.340283 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.349095 env[1563]: time="2024-12-13T14:25:44.349005301Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:44.349439 env[1563]: time="2024-12-13T14:25:44.349153646Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:44.349439 env[1563]: time="2024-12-13T14:25:44.349292902Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:44.349908 env[1563]: time="2024-12-13T14:25:44.349781022Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/32cb438237d7d842f96ae5e5f71ecc7bc4bc79f08dcf5cc7043cf53926c20963 pid=3094 runtime=io.containerd.runc.v2 Dec 13 14:25:44.389291 systemd[1]: Started cri-containerd-32cb438237d7d842f96ae5e5f71ecc7bc4bc79f08dcf5cc7043cf53926c20963.scope. Dec 13 14:25:44.435689 kubelet[2645]: E1213 14:25:44.433782 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.435689 kubelet[2645]: W1213 14:25:44.433807 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.435689 kubelet[2645]: E1213 14:25:44.433835 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.435689 kubelet[2645]: E1213 14:25:44.434528 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.435689 kubelet[2645]: W1213 14:25:44.434543 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.435689 kubelet[2645]: E1213 14:25:44.434577 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.435689 kubelet[2645]: E1213 14:25:44.434932 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.435689 kubelet[2645]: W1213 14:25:44.434943 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.435689 kubelet[2645]: E1213 14:25:44.434972 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.435689 kubelet[2645]: E1213 14:25:44.435543 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.436471 kubelet[2645]: W1213 14:25:44.435554 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.436471 kubelet[2645]: E1213 14:25:44.435574 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.440691 kubelet[2645]: E1213 14:25:44.437047 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.440691 kubelet[2645]: W1213 14:25:44.437063 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.440691 kubelet[2645]: E1213 14:25:44.437173 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.440691 kubelet[2645]: E1213 14:25:44.437399 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.440691 kubelet[2645]: W1213 14:25:44.437409 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.440691 kubelet[2645]: E1213 14:25:44.437507 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.440691 kubelet[2645]: E1213 14:25:44.437805 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.440691 kubelet[2645]: W1213 14:25:44.438019 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.440691 kubelet[2645]: E1213 14:25:44.438130 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.440691 kubelet[2645]: E1213 14:25:44.438401 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.441937 kubelet[2645]: W1213 14:25:44.438412 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.441937 kubelet[2645]: E1213 14:25:44.438518 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.441937 kubelet[2645]: E1213 14:25:44.438756 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.441937 kubelet[2645]: W1213 14:25:44.438776 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.441937 kubelet[2645]: E1213 14:25:44.438921 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.441937 kubelet[2645]: E1213 14:25:44.440297 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.441937 kubelet[2645]: W1213 14:25:44.440310 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.441937 kubelet[2645]: E1213 14:25:44.440414 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.441937 kubelet[2645]: E1213 14:25:44.440612 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.441937 kubelet[2645]: W1213 14:25:44.440622 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.446506 kubelet[2645]: E1213 14:25:44.441261 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.446506 kubelet[2645]: E1213 14:25:44.441506 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.446506 kubelet[2645]: W1213 14:25:44.441517 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.446506 kubelet[2645]: E1213 14:25:44.442707 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.446506 kubelet[2645]: E1213 14:25:44.442882 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.446506 kubelet[2645]: W1213 14:25:44.442892 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.446506 kubelet[2645]: E1213 14:25:44.443634 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.446506 kubelet[2645]: E1213 14:25:44.444108 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.446506 kubelet[2645]: W1213 14:25:44.444120 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.446506 kubelet[2645]: E1213 14:25:44.444218 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.451350 kubelet[2645]: E1213 14:25:44.444352 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.451350 kubelet[2645]: W1213 14:25:44.444360 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.451350 kubelet[2645]: E1213 14:25:44.444519 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.451350 kubelet[2645]: E1213 14:25:44.444709 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.451350 kubelet[2645]: W1213 14:25:44.444719 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.451350 kubelet[2645]: E1213 14:25:44.444881 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.451350 kubelet[2645]: E1213 14:25:44.445107 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.451350 kubelet[2645]: W1213 14:25:44.445117 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.451350 kubelet[2645]: E1213 14:25:44.445424 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.451350 kubelet[2645]: W1213 14:25:44.445481 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.452541 kubelet[2645]: E1213 14:25:44.445818 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.452836 kubelet[2645]: E1213 14:25:44.452807 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.453371 kubelet[2645]: E1213 14:25:44.453355 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.453783 kubelet[2645]: W1213 14:25:44.453764 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.456070 kubelet[2645]: E1213 14:25:44.456045 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.458007 kubelet[2645]: E1213 14:25:44.457988 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.458155 kubelet[2645]: W1213 14:25:44.458139 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.457000 audit: BPF prog-id=125 op=LOAD Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3094 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332636234333832333764376438343266393661653565356637316563 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3094 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332636234333832333764376438343266393661653565356637316563 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit: BPF prog-id=126 op=LOAD Dec 13 14:25:44.459000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000345cd0 items=0 ppid=3094 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332636234333832333764376438343266393661653565356637316563 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.459000 audit: BPF prog-id=127 op=LOAD Dec 13 14:25:44.459000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000345d18 items=0 ppid=3094 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332636234333832333764376438343266393661653565356637316563 Dec 13 14:25:44.460000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:25:44.460000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:25:44.460000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.460000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.460000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.460000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.460000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.460000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.460000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.460000 audit[3109]: AVC avc: denied { perfmon } for pid=3109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.460000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.460000 audit[3109]: AVC avc: denied { bpf } for pid=3109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:44.460000 audit: BPF prog-id=128 op=LOAD Dec 13 14:25:44.460000 audit[3109]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ba128 items=0 ppid=3094 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332636234333832333764376438343266393661653565356637316563 Dec 13 14:25:44.470754 kubelet[2645]: E1213 14:25:44.467581 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.470754 kubelet[2645]: E1213 14:25:44.467915 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.470754 kubelet[2645]: W1213 14:25:44.467992 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.470754 kubelet[2645]: E1213 14:25:44.468150 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.470754 kubelet[2645]: E1213 14:25:44.468376 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.470754 kubelet[2645]: W1213 14:25:44.468387 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.470754 kubelet[2645]: E1213 14:25:44.468516 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.470754 kubelet[2645]: E1213 14:25:44.469455 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.470754 kubelet[2645]: W1213 14:25:44.469468 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.470754 kubelet[2645]: E1213 14:25:44.469600 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.472611 kubelet[2645]: E1213 14:25:44.469795 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.472611 kubelet[2645]: W1213 14:25:44.469804 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.472611 kubelet[2645]: E1213 14:25:44.469920 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.472611 kubelet[2645]: E1213 14:25:44.470057 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.472611 kubelet[2645]: W1213 14:25:44.470066 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.472611 kubelet[2645]: E1213 14:25:44.470082 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.497693 kubelet[2645]: E1213 14:25:44.497654 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:44.498049 kubelet[2645]: W1213 14:25:44.498028 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:44.498171 kubelet[2645]: E1213 14:25:44.498159 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:44.502551 env[1563]: time="2024-12-13T14:25:44.502483862Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d5xtt,Uid:bd5951ce-4283-494a-a266-af361315407b,Namespace:calico-system,Attempt:0,} returns sandbox id \"32cb438237d7d842f96ae5e5f71ecc7bc4bc79f08dcf5cc7043cf53926c20963\"" Dec 13 14:25:44.551000 audit[3160]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:44.551000 audit[3160]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdc01dd8c0 a2=0 a3=7ffdc01dd8ac items=0 ppid=2781 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.551000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:44.555000 audit[3160]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3160 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:44.555000 audit[3160]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc01dd8c0 a2=0 a3=0 items=0 ppid=2781 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:44.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:44.949576 systemd[1]: run-containerd-runc-k8s.io-10803c6bab94a0cdac7e7180ea0ed1ecd5517bbcbd59bc32e0127b159addf743-runc.gMPsVO.mount: Deactivated successfully. Dec 13 14:25:46.124018 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1726701962.mount: Deactivated successfully. Dec 13 14:25:46.510745 kubelet[2645]: E1213 14:25:46.509455 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s6fcz" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" Dec 13 14:25:47.293566 env[1563]: time="2024-12-13T14:25:47.293526339Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:47.301364 env[1563]: time="2024-12-13T14:25:47.301313126Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:47.304081 env[1563]: time="2024-12-13T14:25:47.303957136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:47.306243 env[1563]: time="2024-12-13T14:25:47.306204687Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:47.314607 env[1563]: time="2024-12-13T14:25:47.308125028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:25:47.318769 env[1563]: time="2024-12-13T14:25:47.317683973Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:25:47.349554 env[1563]: time="2024-12-13T14:25:47.349515975Z" level=info msg="CreateContainer within sandbox \"10803c6bab94a0cdac7e7180ea0ed1ecd5517bbcbd59bc32e0127b159addf743\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:25:47.371431 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount714926256.mount: Deactivated successfully. Dec 13 14:25:47.380508 env[1563]: time="2024-12-13T14:25:47.380452365Z" level=info msg="CreateContainer within sandbox \"10803c6bab94a0cdac7e7180ea0ed1ecd5517bbcbd59bc32e0127b159addf743\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3d0d5e63e54e2c4cfb0d1e70a6f1f2ed168d4f079120a1d96c0aae13ec0420a2\"" Dec 13 14:25:47.382618 env[1563]: time="2024-12-13T14:25:47.382567111Z" level=info msg="StartContainer for \"3d0d5e63e54e2c4cfb0d1e70a6f1f2ed168d4f079120a1d96c0aae13ec0420a2\"" Dec 13 14:25:47.444221 systemd[1]: Started cri-containerd-3d0d5e63e54e2c4cfb0d1e70a6f1f2ed168d4f079120a1d96c0aae13ec0420a2.scope. Dec 13 14:25:47.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.507000 audit: BPF prog-id=129 op=LOAD Dec 13 14:25:47.514000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.514000 audit[3171]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3013 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:47.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364306435653633653534653263346366623064316537306136663166 Dec 13 14:25:47.514000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.514000 audit[3171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3013 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:47.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364306435653633653534653263346366623064316537306136663166 Dec 13 14:25:47.515000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.515000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.515000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.515000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.515000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.515000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.515000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.515000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.515000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.515000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.515000 audit: BPF prog-id=130 op=LOAD Dec 13 14:25:47.515000 audit[3171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000372b70 items=0 ppid=3013 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:47.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364306435653633653534653263346366623064316537306136663166 Dec 13 14:25:47.516000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.516000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.516000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.516000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.516000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.516000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.516000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.516000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.516000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.516000 audit: BPF prog-id=131 op=LOAD Dec 13 14:25:47.516000 audit[3171]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000372bb8 items=0 ppid=3013 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:47.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364306435653633653534653263346366623064316537306136663166 Dec 13 14:25:47.517000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:25:47.517000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:25:47.517000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.517000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.517000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.517000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.517000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.517000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.517000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.517000 audit[3171]: AVC avc: denied { perfmon } for pid=3171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.517000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.517000 audit[3171]: AVC avc: denied { bpf } for pid=3171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:47.517000 audit: BPF prog-id=132 op=LOAD Dec 13 14:25:47.517000 audit[3171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000372fc8 items=0 ppid=3013 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:47.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364306435653633653534653263346366623064316537306136663166 Dec 13 14:25:47.599331 env[1563]: time="2024-12-13T14:25:47.596391529Z" level=info msg="StartContainer for \"3d0d5e63e54e2c4cfb0d1e70a6f1f2ed168d4f079120a1d96c0aae13ec0420a2\" returns successfully" Dec 13 14:25:47.774598 kubelet[2645]: E1213 14:25:47.773832 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.774598 kubelet[2645]: W1213 14:25:47.773854 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.774598 kubelet[2645]: E1213 14:25:47.773878 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.775555 kubelet[2645]: E1213 14:25:47.775530 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.775702 kubelet[2645]: W1213 14:25:47.775686 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.775821 kubelet[2645]: E1213 14:25:47.775810 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.776163 kubelet[2645]: E1213 14:25:47.776142 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.776273 kubelet[2645]: W1213 14:25:47.776260 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.776382 kubelet[2645]: E1213 14:25:47.776372 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.776724 kubelet[2645]: E1213 14:25:47.776712 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.776833 kubelet[2645]: W1213 14:25:47.776821 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.776938 kubelet[2645]: E1213 14:25:47.776928 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.777276 kubelet[2645]: E1213 14:25:47.777257 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.777375 kubelet[2645]: W1213 14:25:47.777363 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.777475 kubelet[2645]: E1213 14:25:47.777466 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.777807 kubelet[2645]: E1213 14:25:47.777796 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.777910 kubelet[2645]: W1213 14:25:47.777898 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.778007 kubelet[2645]: E1213 14:25:47.777998 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.778313 kubelet[2645]: E1213 14:25:47.778301 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.778429 kubelet[2645]: W1213 14:25:47.778417 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.778534 kubelet[2645]: E1213 14:25:47.778524 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.778905 kubelet[2645]: E1213 14:25:47.778893 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.779028 kubelet[2645]: W1213 14:25:47.779015 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.779109 kubelet[2645]: E1213 14:25:47.779099 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.780137 kubelet[2645]: E1213 14:25:47.780124 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.780257 kubelet[2645]: W1213 14:25:47.780243 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.780344 kubelet[2645]: E1213 14:25:47.780333 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.780625 kubelet[2645]: E1213 14:25:47.780613 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.780733 kubelet[2645]: W1213 14:25:47.780721 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.780839 kubelet[2645]: E1213 14:25:47.780829 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.781105 kubelet[2645]: E1213 14:25:47.781094 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.781203 kubelet[2645]: W1213 14:25:47.781191 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.781301 kubelet[2645]: E1213 14:25:47.781291 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.781579 kubelet[2645]: E1213 14:25:47.781567 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.781713 kubelet[2645]: W1213 14:25:47.781655 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.781804 kubelet[2645]: E1213 14:25:47.781794 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.782079 kubelet[2645]: E1213 14:25:47.782068 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.782282 kubelet[2645]: W1213 14:25:47.782265 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.782375 kubelet[2645]: E1213 14:25:47.782364 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.782935 kubelet[2645]: E1213 14:25:47.782635 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.783052 kubelet[2645]: W1213 14:25:47.783038 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.783137 kubelet[2645]: E1213 14:25:47.783127 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.783409 kubelet[2645]: E1213 14:25:47.783398 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.783498 kubelet[2645]: W1213 14:25:47.783487 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.783586 kubelet[2645]: E1213 14:25:47.783577 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.862607 kubelet[2645]: E1213 14:25:47.862577 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.862837 kubelet[2645]: W1213 14:25:47.862818 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.862949 kubelet[2645]: E1213 14:25:47.862937 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.863413 kubelet[2645]: E1213 14:25:47.863399 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.863537 kubelet[2645]: W1213 14:25:47.863524 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.863627 kubelet[2645]: E1213 14:25:47.863618 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.863946 kubelet[2645]: E1213 14:25:47.863934 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.864063 kubelet[2645]: W1213 14:25:47.864051 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.864157 kubelet[2645]: E1213 14:25:47.864148 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.864468 kubelet[2645]: E1213 14:25:47.864456 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.864576 kubelet[2645]: W1213 14:25:47.864565 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.864673 kubelet[2645]: E1213 14:25:47.864654 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.864979 kubelet[2645]: E1213 14:25:47.864967 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.865079 kubelet[2645]: W1213 14:25:47.865068 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.865168 kubelet[2645]: E1213 14:25:47.865160 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.865558 kubelet[2645]: E1213 14:25:47.865547 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.865642 kubelet[2645]: W1213 14:25:47.865631 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.865736 kubelet[2645]: E1213 14:25:47.865727 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.866370 kubelet[2645]: E1213 14:25:47.866356 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.866480 kubelet[2645]: W1213 14:25:47.866468 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.866703 kubelet[2645]: E1213 14:25:47.866687 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.866874 kubelet[2645]: E1213 14:25:47.866833 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.866967 kubelet[2645]: W1213 14:25:47.866956 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.867167 kubelet[2645]: E1213 14:25:47.867154 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.867308 kubelet[2645]: E1213 14:25:47.867300 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.867395 kubelet[2645]: W1213 14:25:47.867386 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.867597 kubelet[2645]: E1213 14:25:47.867582 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.867944 kubelet[2645]: E1213 14:25:47.867933 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.868052 kubelet[2645]: W1213 14:25:47.868042 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.868148 kubelet[2645]: E1213 14:25:47.868139 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.869802 kubelet[2645]: E1213 14:25:47.869759 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.869923 kubelet[2645]: W1213 14:25:47.869910 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.870021 kubelet[2645]: E1213 14:25:47.870012 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.871687 kubelet[2645]: E1213 14:25:47.870321 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.871687 kubelet[2645]: W1213 14:25:47.870334 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.871878 kubelet[2645]: E1213 14:25:47.871864 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.872224 kubelet[2645]: E1213 14:25:47.872209 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.872224 kubelet[2645]: W1213 14:25:47.872225 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.872481 kubelet[2645]: E1213 14:25:47.872468 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.872657 kubelet[2645]: E1213 14:25:47.872644 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.872657 kubelet[2645]: W1213 14:25:47.872658 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.872885 kubelet[2645]: E1213 14:25:47.872808 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.872980 kubelet[2645]: E1213 14:25:47.872966 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.873045 kubelet[2645]: W1213 14:25:47.872981 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.873045 kubelet[2645]: E1213 14:25:47.873000 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.873675 kubelet[2645]: E1213 14:25:47.873649 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.873758 kubelet[2645]: W1213 14:25:47.873676 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.873758 kubelet[2645]: E1213 14:25:47.873693 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.874151 kubelet[2645]: E1213 14:25:47.874135 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.874151 kubelet[2645]: W1213 14:25:47.874150 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.874262 kubelet[2645]: E1213 14:25:47.874166 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:47.877319 kubelet[2645]: E1213 14:25:47.877289 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:47.877319 kubelet[2645]: W1213 14:25:47.877317 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:47.877518 kubelet[2645]: E1213 14:25:47.877336 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.509491 kubelet[2645]: E1213 14:25:48.509449 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s6fcz" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" Dec 13 14:25:48.748316 kubelet[2645]: I1213 14:25:48.748283 2645 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:25:48.793030 kubelet[2645]: E1213 14:25:48.792595 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.793030 kubelet[2645]: W1213 14:25:48.792630 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.793030 kubelet[2645]: E1213 14:25:48.792657 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.793030 kubelet[2645]: E1213 14:25:48.792894 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.793030 kubelet[2645]: W1213 14:25:48.792903 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.793030 kubelet[2645]: E1213 14:25:48.792919 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.793794 kubelet[2645]: E1213 14:25:48.793122 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.793794 kubelet[2645]: W1213 14:25:48.793130 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.793794 kubelet[2645]: E1213 14:25:48.793146 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.793794 kubelet[2645]: E1213 14:25:48.793382 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.793794 kubelet[2645]: W1213 14:25:48.793392 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.793794 kubelet[2645]: E1213 14:25:48.793406 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.793794 kubelet[2645]: E1213 14:25:48.793602 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.793794 kubelet[2645]: W1213 14:25:48.793610 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.793794 kubelet[2645]: E1213 14:25:48.793625 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.794238 kubelet[2645]: E1213 14:25:48.793812 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.794238 kubelet[2645]: W1213 14:25:48.793821 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.794238 kubelet[2645]: E1213 14:25:48.793836 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.794238 kubelet[2645]: E1213 14:25:48.794007 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.794238 kubelet[2645]: W1213 14:25:48.794016 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.794238 kubelet[2645]: E1213 14:25:48.794030 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.794238 kubelet[2645]: E1213 14:25:48.794201 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.794238 kubelet[2645]: W1213 14:25:48.794210 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.794238 kubelet[2645]: E1213 14:25:48.794224 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.795059 kubelet[2645]: E1213 14:25:48.794756 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.795059 kubelet[2645]: W1213 14:25:48.794768 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.795059 kubelet[2645]: E1213 14:25:48.794786 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.795059 kubelet[2645]: E1213 14:25:48.794985 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.795059 kubelet[2645]: W1213 14:25:48.794994 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.795059 kubelet[2645]: E1213 14:25:48.795009 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.795359 kubelet[2645]: E1213 14:25:48.795184 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.795359 kubelet[2645]: W1213 14:25:48.795195 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.795359 kubelet[2645]: E1213 14:25:48.795210 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.795496 kubelet[2645]: E1213 14:25:48.795396 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.795496 kubelet[2645]: W1213 14:25:48.795404 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.795496 kubelet[2645]: E1213 14:25:48.795419 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.795646 kubelet[2645]: E1213 14:25:48.795602 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.795646 kubelet[2645]: W1213 14:25:48.795611 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.795646 kubelet[2645]: E1213 14:25:48.795625 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.796055 kubelet[2645]: E1213 14:25:48.796035 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.796055 kubelet[2645]: W1213 14:25:48.796054 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.796310 kubelet[2645]: E1213 14:25:48.796072 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.796396 kubelet[2645]: E1213 14:25:48.796380 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.796449 kubelet[2645]: W1213 14:25:48.796397 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.796449 kubelet[2645]: E1213 14:25:48.796416 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.831596 env[1563]: time="2024-12-13T14:25:48.831548560Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:48.833840 env[1563]: time="2024-12-13T14:25:48.833798977Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:48.835733 env[1563]: time="2024-12-13T14:25:48.835700585Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:48.837391 env[1563]: time="2024-12-13T14:25:48.837356013Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:48.837917 env[1563]: time="2024-12-13T14:25:48.837883077Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:25:48.841516 env[1563]: time="2024-12-13T14:25:48.841476169Z" level=info msg="CreateContainer within sandbox \"32cb438237d7d842f96ae5e5f71ecc7bc4bc79f08dcf5cc7043cf53926c20963\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:25:48.857454 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3754635885.mount: Deactivated successfully. Dec 13 14:25:48.877637 kubelet[2645]: E1213 14:25:48.875342 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.877637 kubelet[2645]: W1213 14:25:48.875558 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.877637 kubelet[2645]: E1213 14:25:48.875591 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.877637 kubelet[2645]: E1213 14:25:48.876364 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.877637 kubelet[2645]: W1213 14:25:48.876378 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.877637 kubelet[2645]: E1213 14:25:48.876430 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.877637 kubelet[2645]: E1213 14:25:48.876889 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.877637 kubelet[2645]: W1213 14:25:48.876900 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.877637 kubelet[2645]: E1213 14:25:48.876948 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.877637 kubelet[2645]: E1213 14:25:48.877531 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.879226 kubelet[2645]: W1213 14:25:48.877543 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.879226 kubelet[2645]: E1213 14:25:48.877722 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.879226 kubelet[2645]: E1213 14:25:48.878000 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.879226 kubelet[2645]: W1213 14:25:48.878015 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.880085 kubelet[2645]: E1213 14:25:48.880056 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.880555 kubelet[2645]: E1213 14:25:48.880375 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.880555 kubelet[2645]: W1213 14:25:48.880390 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.880555 kubelet[2645]: E1213 14:25:48.880512 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.881066 kubelet[2645]: E1213 14:25:48.880738 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.881066 kubelet[2645]: W1213 14:25:48.880749 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.881066 kubelet[2645]: E1213 14:25:48.880878 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.881446 kubelet[2645]: E1213 14:25:48.881288 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.881446 kubelet[2645]: W1213 14:25:48.881301 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.881446 kubelet[2645]: E1213 14:25:48.881323 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.882222 kubelet[2645]: E1213 14:25:48.881703 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.882222 kubelet[2645]: W1213 14:25:48.881716 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.882222 kubelet[2645]: E1213 14:25:48.881840 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.882222 kubelet[2645]: E1213 14:25:48.881944 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.882222 kubelet[2645]: W1213 14:25:48.881951 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.882222 kubelet[2645]: E1213 14:25:48.882192 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.883253 kubelet[2645]: E1213 14:25:48.882638 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.883253 kubelet[2645]: W1213 14:25:48.882650 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.883253 kubelet[2645]: E1213 14:25:48.882836 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.883253 kubelet[2645]: E1213 14:25:48.882951 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.883253 kubelet[2645]: W1213 14:25:48.882959 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.883253 kubelet[2645]: E1213 14:25:48.882984 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.884021 kubelet[2645]: E1213 14:25:48.883843 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.884021 kubelet[2645]: W1213 14:25:48.883866 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.884021 kubelet[2645]: E1213 14:25:48.883976 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.885337 kubelet[2645]: E1213 14:25:48.884243 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.885337 kubelet[2645]: W1213 14:25:48.884254 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.885337 kubelet[2645]: E1213 14:25:48.884511 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.885337 kubelet[2645]: E1213 14:25:48.884635 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.885337 kubelet[2645]: W1213 14:25:48.884644 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.885337 kubelet[2645]: E1213 14:25:48.884724 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.885916 kubelet[2645]: E1213 14:25:48.885737 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.885916 kubelet[2645]: W1213 14:25:48.885750 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.885916 kubelet[2645]: E1213 14:25:48.885771 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.886405 kubelet[2645]: E1213 14:25:48.886137 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.886405 kubelet[2645]: W1213 14:25:48.886148 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.886405 kubelet[2645]: E1213 14:25:48.886178 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.887761 kubelet[2645]: E1213 14:25:48.887747 2645 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:48.887868 kubelet[2645]: W1213 14:25:48.887843 2645 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:48.887868 kubelet[2645]: E1213 14:25:48.887869 2645 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:48.888927 env[1563]: time="2024-12-13T14:25:48.888847758Z" level=info msg="CreateContainer within sandbox \"32cb438237d7d842f96ae5e5f71ecc7bc4bc79f08dcf5cc7043cf53926c20963\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"69401db486e3d25330fb1a6bf020c07c465065a0d77f8b85a78c8010aaf6231d\"" Dec 13 14:25:48.890147 env[1563]: time="2024-12-13T14:25:48.889427651Z" level=info msg="StartContainer for \"69401db486e3d25330fb1a6bf020c07c465065a0d77f8b85a78c8010aaf6231d\"" Dec 13 14:25:48.934527 systemd[1]: Started cri-containerd-69401db486e3d25330fb1a6bf020c07c465065a0d77f8b85a78c8010aaf6231d.scope. Dec 13 14:25:48.967253 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 14:25:48.967480 kernel: audit: type=1400 audit(1734099948.957:997): avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.967542 kernel: audit: type=1300 audit(1734099948.957:997): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1396306c28 items=0 ppid=3094 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1396306c28 items=0 ppid=3094 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.973692 kernel: audit: type=1327 audit(1734099948.957:997): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343031646234383665336432353333306662316136626630323063 Dec 13 14:25:48.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343031646234383665336432353333306662316136626630323063 Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.980837 kernel: audit: type=1400 audit(1734099948.957:998): avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.980949 kernel: audit: type=1400 audit(1734099948.957:998): avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.984181 kernel: audit: type=1400 audit(1734099948.957:998): avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.998346 kernel: audit: type=1400 audit(1734099948.957:998): avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:49.005980 kernel: audit: type=1400 audit(1734099948.957:998): avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:49.006060 kernel: audit: type=1400 audit(1734099948.957:998): avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.957000 audit: BPF prog-id=133 op=LOAD Dec 13 14:25:48.957000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b8d38 items=0 ppid=3094 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343031646234383665336432353333306662316136626630323063 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:49.011876 kernel: audit: type=1400 audit(1734099948.957:998): avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit: BPF prog-id=134 op=LOAD Dec 13 14:25:48.966000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b8d88 items=0 ppid=3094 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343031646234383665336432353333306662316136626630323063 Dec 13 14:25:48.966000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:25:48.966000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.966000 audit: BPF prog-id=135 op=LOAD Dec 13 14:25:48.966000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b8e18 items=0 ppid=3094 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639343031646234383665336432353333306662316136626630323063 Dec 13 14:25:49.018084 env[1563]: time="2024-12-13T14:25:49.018012468Z" level=info msg="StartContainer for \"69401db486e3d25330fb1a6bf020c07c465065a0d77f8b85a78c8010aaf6231d\" returns successfully" Dec 13 14:25:49.034284 systemd[1]: cri-containerd-69401db486e3d25330fb1a6bf020c07c465065a0d77f8b85a78c8010aaf6231d.scope: Deactivated successfully. Dec 13 14:25:49.038000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:25:49.117437 env[1563]: time="2024-12-13T14:25:49.117378770Z" level=info msg="shim disconnected" id=69401db486e3d25330fb1a6bf020c07c465065a0d77f8b85a78c8010aaf6231d Dec 13 14:25:49.117437 env[1563]: time="2024-12-13T14:25:49.117425438Z" level=warning msg="cleaning up after shim disconnected" id=69401db486e3d25330fb1a6bf020c07c465065a0d77f8b85a78c8010aaf6231d namespace=k8s.io Dec 13 14:25:49.117437 env[1563]: time="2024-12-13T14:25:49.117439227Z" level=info msg="cleaning up dead shim" Dec 13 14:25:49.128140 env[1563]: time="2024-12-13T14:25:49.128069879Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:25:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3315 runtime=io.containerd.runc.v2\n" Dec 13 14:25:49.342714 systemd[1]: run-containerd-runc-k8s.io-69401db486e3d25330fb1a6bf020c07c465065a0d77f8b85a78c8010aaf6231d-runc.DELYWa.mount: Deactivated successfully. Dec 13 14:25:49.342859 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-69401db486e3d25330fb1a6bf020c07c465065a0d77f8b85a78c8010aaf6231d-rootfs.mount: Deactivated successfully. Dec 13 14:25:49.756290 env[1563]: time="2024-12-13T14:25:49.756243193Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:25:49.792634 kubelet[2645]: I1213 14:25:49.792594 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6bf69b695d-b5rc5" podStartSLOduration=3.689120566 podStartE2EDuration="6.7925306s" podCreationTimestamp="2024-12-13 14:25:43 +0000 UTC" firstStartedPulling="2024-12-13 14:25:44.213096969 +0000 UTC m=+20.995311790" lastFinishedPulling="2024-12-13 14:25:47.316507002 +0000 UTC m=+24.098721824" observedRunningTime="2024-12-13 14:25:47.799950023 +0000 UTC m=+24.582164855" watchObservedRunningTime="2024-12-13 14:25:49.7925306 +0000 UTC m=+26.574745434" Dec 13 14:25:50.509573 kubelet[2645]: E1213 14:25:50.509540 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s6fcz" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" Dec 13 14:25:52.510332 kubelet[2645]: E1213 14:25:52.509903 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s6fcz" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" Dec 13 14:25:54.510438 kubelet[2645]: E1213 14:25:54.509798 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s6fcz" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" Dec 13 14:25:56.433404 env[1563]: time="2024-12-13T14:25:56.433351791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:56.438414 env[1563]: time="2024-12-13T14:25:56.438365662Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:56.441210 env[1563]: time="2024-12-13T14:25:56.441157861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:56.443418 env[1563]: time="2024-12-13T14:25:56.443375490Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:56.444143 env[1563]: time="2024-12-13T14:25:56.444105023Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:25:56.447470 env[1563]: time="2024-12-13T14:25:56.447424244Z" level=info msg="CreateContainer within sandbox \"32cb438237d7d842f96ae5e5f71ecc7bc4bc79f08dcf5cc7043cf53926c20963\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:25:56.466044 env[1563]: time="2024-12-13T14:25:56.465994005Z" level=info msg="CreateContainer within sandbox \"32cb438237d7d842f96ae5e5f71ecc7bc4bc79f08dcf5cc7043cf53926c20963\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4167cd96bfa408150a625c64e7b739ed85dc89fce2fa3c54edd8421ebc52b50b\"" Dec 13 14:25:56.467967 env[1563]: time="2024-12-13T14:25:56.466823864Z" level=info msg="StartContainer for \"4167cd96bfa408150a625c64e7b739ed85dc89fce2fa3c54edd8421ebc52b50b\"" Dec 13 14:25:56.517543 kubelet[2645]: E1213 14:25:56.515700 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s6fcz" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" Dec 13 14:25:56.519423 systemd[1]: Started cri-containerd-4167cd96bfa408150a625c64e7b739ed85dc89fce2fa3c54edd8421ebc52b50b.scope. Dec 13 14:25:56.527499 systemd[1]: run-containerd-runc-k8s.io-4167cd96bfa408150a625c64e7b739ed85dc89fce2fa3c54edd8421ebc52b50b-runc.3V7ijR.mount: Deactivated successfully. Dec 13 14:25:56.566755 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:25:56.566918 kernel: audit: type=1400 audit(1734099956.556:1004): avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.566963 kernel: audit: type=1300 audit(1734099956.556:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f34ac502918 items=0 ppid=3094 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f34ac502918 items=0 ppid=3094 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:56.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363763643936626661343038313530613632356336346537623733 Dec 13 14:25:56.579007 kernel: audit: type=1327 audit(1734099956.556:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363763643936626661343038313530613632356336346537623733 Dec 13 14:25:56.579146 kernel: audit: type=1400 audit(1734099956.556:1005): avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.584810 kernel: audit: type=1400 audit(1734099956.556:1005): avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.588774 kernel: audit: type=1400 audit(1734099956.556:1005): avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.601549 kernel: audit: type=1400 audit(1734099956.556:1005): avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.601718 kernel: audit: type=1400 audit(1734099956.556:1005): avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.602050 env[1563]: time="2024-12-13T14:25:56.598627541Z" level=info msg="StartContainer for \"4167cd96bfa408150a625c64e7b739ed85dc89fce2fa3c54edd8421ebc52b50b\" returns successfully" Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.609933 kernel: audit: type=1400 audit(1734099956.556:1005): avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.610066 kernel: audit: type=1400 audit(1734099956.556:1005): avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.556000 audit: BPF prog-id=136 op=LOAD Dec 13 14:25:56.556000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002d3d68 items=0 ppid=3094 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:56.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363763643936626661343038313530613632356336346537623733 Dec 13 14:25:56.557000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.557000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.557000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.557000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.557000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.557000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.557000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.557000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.557000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.557000 audit: BPF prog-id=137 op=LOAD Dec 13 14:25:56.557000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002d3db8 items=0 ppid=3094 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:56.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363763643936626661343038313530613632356336346537623733 Dec 13 14:25:56.561000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:25:56.561000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:25:56.561000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.561000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.561000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.561000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.561000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.561000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.561000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.561000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.561000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.561000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.561000 audit: BPF prog-id=138 op=LOAD Dec 13 14:25:56.561000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002d3e48 items=0 ppid=3094 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:56.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363763643936626661343038313530613632356336346537623733 Dec 13 14:25:57.557787 systemd[1]: cri-containerd-4167cd96bfa408150a625c64e7b739ed85dc89fce2fa3c54edd8421ebc52b50b.scope: Deactivated successfully. Dec 13 14:25:57.561000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:25:57.569513 kubelet[2645]: I1213 14:25:57.569468 2645 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:25:57.634878 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4167cd96bfa408150a625c64e7b739ed85dc89fce2fa3c54edd8421ebc52b50b-rootfs.mount: Deactivated successfully. Dec 13 14:25:57.661803 kubelet[2645]: I1213 14:25:57.661771 2645 topology_manager.go:215] "Topology Admit Handler" podUID="fb613f52-6627-4d24-8dbd-721f760f95a9" podNamespace="kube-system" podName="coredns-76f75df574-lbzkq" Dec 13 14:25:57.674310 kubelet[2645]: I1213 14:25:57.674258 2645 topology_manager.go:215] "Topology Admit Handler" podUID="b73bff90-b7f9-4979-8202-4d0b0fbdadf1" podNamespace="kube-system" podName="coredns-76f75df574-q5zdp" Dec 13 14:25:57.675469 kubelet[2645]: I1213 14:25:57.675446 2645 topology_manager.go:215] "Topology Admit Handler" podUID="00f39773-a08d-4d77-9373-3af4490cf007" podNamespace="calico-system" podName="calico-kube-controllers-5684b959c9-4kqlh" Dec 13 14:25:57.678694 kubelet[2645]: I1213 14:25:57.675786 2645 topology_manager.go:215] "Topology Admit Handler" podUID="7f4eab33-6c5f-495d-be39-ef9019e2885c" podNamespace="calico-apiserver" podName="calico-apiserver-6894cd8877-5cdtx" Dec 13 14:25:57.682267 kubelet[2645]: I1213 14:25:57.682235 2645 topology_manager.go:215] "Topology Admit Handler" podUID="dfb2bde3-020b-4bbe-afb2-09f9d51b7e98" podNamespace="calico-apiserver" podName="calico-apiserver-6894cd8877-mdgpx" Dec 13 14:25:57.685889 systemd[1]: Created slice kubepods-burstable-podfb613f52_6627_4d24_8dbd_721f760f95a9.slice. Dec 13 14:25:57.699237 systemd[1]: Created slice kubepods-besteffort-poddfb2bde3_020b_4bbe_afb2_09f9d51b7e98.slice. Dec 13 14:25:57.709444 systemd[1]: Created slice kubepods-besteffort-pod7f4eab33_6c5f_495d_be39_ef9019e2885c.slice. Dec 13 14:25:57.722598 systemd[1]: Created slice kubepods-besteffort-pod00f39773_a08d_4d77_9373_3af4490cf007.slice. Dec 13 14:25:57.732168 systemd[1]: Created slice kubepods-burstable-podb73bff90_b7f9_4979_8202_4d0b0fbdadf1.slice. Dec 13 14:25:57.782815 kubelet[2645]: I1213 14:25:57.782776 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tppcs\" (UniqueName: \"kubernetes.io/projected/00f39773-a08d-4d77-9373-3af4490cf007-kube-api-access-tppcs\") pod \"calico-kube-controllers-5684b959c9-4kqlh\" (UID: \"00f39773-a08d-4d77-9373-3af4490cf007\") " pod="calico-system/calico-kube-controllers-5684b959c9-4kqlh" Dec 13 14:25:57.783162 kubelet[2645]: I1213 14:25:57.782831 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/dfb2bde3-020b-4bbe-afb2-09f9d51b7e98-calico-apiserver-certs\") pod \"calico-apiserver-6894cd8877-mdgpx\" (UID: \"dfb2bde3-020b-4bbe-afb2-09f9d51b7e98\") " pod="calico-apiserver/calico-apiserver-6894cd8877-mdgpx" Dec 13 14:25:57.783162 kubelet[2645]: I1213 14:25:57.782864 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b73bff90-b7f9-4979-8202-4d0b0fbdadf1-config-volume\") pod \"coredns-76f75df574-q5zdp\" (UID: \"b73bff90-b7f9-4979-8202-4d0b0fbdadf1\") " pod="kube-system/coredns-76f75df574-q5zdp" Dec 13 14:25:57.783162 kubelet[2645]: I1213 14:25:57.782892 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rlj8v\" (UniqueName: \"kubernetes.io/projected/b73bff90-b7f9-4979-8202-4d0b0fbdadf1-kube-api-access-rlj8v\") pod \"coredns-76f75df574-q5zdp\" (UID: \"b73bff90-b7f9-4979-8202-4d0b0fbdadf1\") " pod="kube-system/coredns-76f75df574-q5zdp" Dec 13 14:25:57.783162 kubelet[2645]: I1213 14:25:57.782924 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-465n6\" (UniqueName: \"kubernetes.io/projected/dfb2bde3-020b-4bbe-afb2-09f9d51b7e98-kube-api-access-465n6\") pod \"calico-apiserver-6894cd8877-mdgpx\" (UID: \"dfb2bde3-020b-4bbe-afb2-09f9d51b7e98\") " pod="calico-apiserver/calico-apiserver-6894cd8877-mdgpx" Dec 13 14:25:57.783162 kubelet[2645]: I1213 14:25:57.782954 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zn587\" (UniqueName: \"kubernetes.io/projected/fb613f52-6627-4d24-8dbd-721f760f95a9-kube-api-access-zn587\") pod \"coredns-76f75df574-lbzkq\" (UID: \"fb613f52-6627-4d24-8dbd-721f760f95a9\") " pod="kube-system/coredns-76f75df574-lbzkq" Dec 13 14:25:57.783447 kubelet[2645]: I1213 14:25:57.782985 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/00f39773-a08d-4d77-9373-3af4490cf007-tigera-ca-bundle\") pod \"calico-kube-controllers-5684b959c9-4kqlh\" (UID: \"00f39773-a08d-4d77-9373-3af4490cf007\") " pod="calico-system/calico-kube-controllers-5684b959c9-4kqlh" Dec 13 14:25:57.783447 kubelet[2645]: I1213 14:25:57.783019 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7f4eab33-6c5f-495d-be39-ef9019e2885c-calico-apiserver-certs\") pod \"calico-apiserver-6894cd8877-5cdtx\" (UID: \"7f4eab33-6c5f-495d-be39-ef9019e2885c\") " pod="calico-apiserver/calico-apiserver-6894cd8877-5cdtx" Dec 13 14:25:57.783447 kubelet[2645]: I1213 14:25:57.783053 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vgpms\" (UniqueName: \"kubernetes.io/projected/7f4eab33-6c5f-495d-be39-ef9019e2885c-kube-api-access-vgpms\") pod \"calico-apiserver-6894cd8877-5cdtx\" (UID: \"7f4eab33-6c5f-495d-be39-ef9019e2885c\") " pod="calico-apiserver/calico-apiserver-6894cd8877-5cdtx" Dec 13 14:25:57.783447 kubelet[2645]: I1213 14:25:57.783086 2645 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/fb613f52-6627-4d24-8dbd-721f760f95a9-config-volume\") pod \"coredns-76f75df574-lbzkq\" (UID: \"fb613f52-6627-4d24-8dbd-721f760f95a9\") " pod="kube-system/coredns-76f75df574-lbzkq" Dec 13 14:25:57.788007 env[1563]: time="2024-12-13T14:25:57.787956530Z" level=info msg="shim disconnected" id=4167cd96bfa408150a625c64e7b739ed85dc89fce2fa3c54edd8421ebc52b50b Dec 13 14:25:57.788007 env[1563]: time="2024-12-13T14:25:57.788007910Z" level=warning msg="cleaning up after shim disconnected" id=4167cd96bfa408150a625c64e7b739ed85dc89fce2fa3c54edd8421ebc52b50b namespace=k8s.io Dec 13 14:25:57.788502 env[1563]: time="2024-12-13T14:25:57.788020905Z" level=info msg="cleaning up dead shim" Dec 13 14:25:57.814115 env[1563]: time="2024-12-13T14:25:57.809483811Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:25:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3380 runtime=io.containerd.runc.v2\n" Dec 13 14:25:57.995320 env[1563]: time="2024-12-13T14:25:57.995190615Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-lbzkq,Uid:fb613f52-6627-4d24-8dbd-721f760f95a9,Namespace:kube-system,Attempt:0,}" Dec 13 14:25:58.008007 env[1563]: time="2024-12-13T14:25:58.007615825Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6894cd8877-mdgpx,Uid:dfb2bde3-020b-4bbe-afb2-09f9d51b7e98,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:25:58.039729 env[1563]: time="2024-12-13T14:25:58.039621055Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q5zdp,Uid:b73bff90-b7f9-4979-8202-4d0b0fbdadf1,Namespace:kube-system,Attempt:0,}" Dec 13 14:25:58.040812 env[1563]: time="2024-12-13T14:25:58.039621061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6894cd8877-5cdtx,Uid:7f4eab33-6c5f-495d-be39-ef9019e2885c,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:25:58.041259 env[1563]: time="2024-12-13T14:25:58.039771980Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5684b959c9-4kqlh,Uid:00f39773-a08d-4d77-9373-3af4490cf007,Namespace:calico-system,Attempt:0,}" Dec 13 14:25:58.478010 env[1563]: time="2024-12-13T14:25:58.477928744Z" level=error msg="Failed to destroy network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.484730 env[1563]: time="2024-12-13T14:25:58.481122231Z" level=error msg="Failed to destroy network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.489998 env[1563]: time="2024-12-13T14:25:58.489926614Z" level=error msg="encountered an error cleaning up failed sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.490769 env[1563]: time="2024-12-13T14:25:58.490386658Z" level=error msg="encountered an error cleaning up failed sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.491000 env[1563]: time="2024-12-13T14:25:58.490957007Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6894cd8877-mdgpx,Uid:dfb2bde3-020b-4bbe-afb2-09f9d51b7e98,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.491480 kubelet[2645]: E1213 14:25:58.491431 2645 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.491584 kubelet[2645]: E1213 14:25:58.491508 2645 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6894cd8877-mdgpx" Dec 13 14:25:58.491584 kubelet[2645]: E1213 14:25:58.491539 2645 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6894cd8877-mdgpx" Dec 13 14:25:58.496469 kubelet[2645]: E1213 14:25:58.491618 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6894cd8877-mdgpx_calico-apiserver(dfb2bde3-020b-4bbe-afb2-09f9d51b7e98)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6894cd8877-mdgpx_calico-apiserver(dfb2bde3-020b-4bbe-afb2-09f9d51b7e98)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6894cd8877-mdgpx" podUID="dfb2bde3-020b-4bbe-afb2-09f9d51b7e98" Dec 13 14:25:58.496720 env[1563]: time="2024-12-13T14:25:58.490648459Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-lbzkq,Uid:fb613f52-6627-4d24-8dbd-721f760f95a9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.497110 kubelet[2645]: E1213 14:25:58.497078 2645 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.497214 kubelet[2645]: E1213 14:25:58.497184 2645 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-lbzkq" Dec 13 14:25:58.499613 kubelet[2645]: E1213 14:25:58.497214 2645 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-lbzkq" Dec 13 14:25:58.499613 kubelet[2645]: E1213 14:25:58.497440 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-lbzkq_kube-system(fb613f52-6627-4d24-8dbd-721f760f95a9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-lbzkq_kube-system(fb613f52-6627-4d24-8dbd-721f760f95a9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-lbzkq" podUID="fb613f52-6627-4d24-8dbd-721f760f95a9" Dec 13 14:25:58.518985 systemd[1]: Created slice kubepods-besteffort-pod797ccd89_3053_4e0b_b83c_d48e6ae1f519.slice. Dec 13 14:25:58.525399 env[1563]: time="2024-12-13T14:25:58.525201989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s6fcz,Uid:797ccd89-3053-4e0b-b83c-d48e6ae1f519,Namespace:calico-system,Attempt:0,}" Dec 13 14:25:58.544044 env[1563]: time="2024-12-13T14:25:58.543977185Z" level=error msg="Failed to destroy network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.544561 env[1563]: time="2024-12-13T14:25:58.544295396Z" level=error msg="Failed to destroy network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.549688 env[1563]: time="2024-12-13T14:25:58.548853858Z" level=error msg="encountered an error cleaning up failed sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.549688 env[1563]: time="2024-12-13T14:25:58.548945203Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5684b959c9-4kqlh,Uid:00f39773-a08d-4d77-9373-3af4490cf007,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.551925 kubelet[2645]: E1213 14:25:58.549224 2645 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.551925 kubelet[2645]: E1213 14:25:58.549290 2645 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5684b959c9-4kqlh" Dec 13 14:25:58.551925 kubelet[2645]: E1213 14:25:58.549320 2645 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5684b959c9-4kqlh" Dec 13 14:25:58.555688 env[1563]: time="2024-12-13T14:25:58.550029627Z" level=error msg="encountered an error cleaning up failed sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.555688 env[1563]: time="2024-12-13T14:25:58.550102691Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q5zdp,Uid:b73bff90-b7f9-4979-8202-4d0b0fbdadf1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.555819 kubelet[2645]: E1213 14:25:58.549394 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5684b959c9-4kqlh_calico-system(00f39773-a08d-4d77-9373-3af4490cf007)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5684b959c9-4kqlh_calico-system(00f39773-a08d-4d77-9373-3af4490cf007)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5684b959c9-4kqlh" podUID="00f39773-a08d-4d77-9373-3af4490cf007" Dec 13 14:25:58.555819 kubelet[2645]: E1213 14:25:58.550343 2645 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.555819 kubelet[2645]: E1213 14:25:58.550388 2645 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-q5zdp" Dec 13 14:25:58.556007 kubelet[2645]: E1213 14:25:58.550421 2645 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-q5zdp" Dec 13 14:25:58.556007 kubelet[2645]: E1213 14:25:58.550479 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-q5zdp_kube-system(b73bff90-b7f9-4979-8202-4d0b0fbdadf1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-q5zdp_kube-system(b73bff90-b7f9-4979-8202-4d0b0fbdadf1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-q5zdp" podUID="b73bff90-b7f9-4979-8202-4d0b0fbdadf1" Dec 13 14:25:58.604931 env[1563]: time="2024-12-13T14:25:58.604869902Z" level=error msg="Failed to destroy network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.607141 env[1563]: time="2024-12-13T14:25:58.607077042Z" level=error msg="encountered an error cleaning up failed sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.607328 env[1563]: time="2024-12-13T14:25:58.607165245Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6894cd8877-5cdtx,Uid:7f4eab33-6c5f-495d-be39-ef9019e2885c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.609794 kubelet[2645]: E1213 14:25:58.607452 2645 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.609794 kubelet[2645]: E1213 14:25:58.607537 2645 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6894cd8877-5cdtx" Dec 13 14:25:58.609794 kubelet[2645]: E1213 14:25:58.607567 2645 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6894cd8877-5cdtx" Dec 13 14:25:58.611168 kubelet[2645]: E1213 14:25:58.609543 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6894cd8877-5cdtx_calico-apiserver(7f4eab33-6c5f-495d-be39-ef9019e2885c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6894cd8877-5cdtx_calico-apiserver(7f4eab33-6c5f-495d-be39-ef9019e2885c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6894cd8877-5cdtx" podUID="7f4eab33-6c5f-495d-be39-ef9019e2885c" Dec 13 14:25:58.692227 env[1563]: time="2024-12-13T14:25:58.692163832Z" level=error msg="Failed to destroy network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.693077 env[1563]: time="2024-12-13T14:25:58.693014890Z" level=error msg="encountered an error cleaning up failed sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.693334 env[1563]: time="2024-12-13T14:25:58.693295129Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s6fcz,Uid:797ccd89-3053-4e0b-b83c-d48e6ae1f519,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.694936 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2-shm.mount: Deactivated successfully. Dec 13 14:25:58.697142 kubelet[2645]: E1213 14:25:58.696047 2645 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.697142 kubelet[2645]: E1213 14:25:58.696125 2645 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-s6fcz" Dec 13 14:25:58.697142 kubelet[2645]: E1213 14:25:58.696159 2645 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-s6fcz" Dec 13 14:25:58.697519 kubelet[2645]: E1213 14:25:58.697457 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-s6fcz_calico-system(797ccd89-3053-4e0b-b83c-d48e6ae1f519)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-s6fcz_calico-system(797ccd89-3053-4e0b-b83c-d48e6ae1f519)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-s6fcz" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" Dec 13 14:25:58.815854 kubelet[2645]: I1213 14:25:58.813353 2645 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:25:58.821495 env[1563]: time="2024-12-13T14:25:58.821455218Z" level=info msg="StopPodSandbox for \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\"" Dec 13 14:25:58.829281 env[1563]: time="2024-12-13T14:25:58.829241041Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:25:58.840755 kubelet[2645]: I1213 14:25:58.840718 2645 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:25:58.848149 env[1563]: time="2024-12-13T14:25:58.845443316Z" level=info msg="StopPodSandbox for \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\"" Dec 13 14:25:58.849135 kubelet[2645]: I1213 14:25:58.849103 2645 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:25:58.850271 env[1563]: time="2024-12-13T14:25:58.850233676Z" level=info msg="StopPodSandbox for \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\"" Dec 13 14:25:58.854215 kubelet[2645]: I1213 14:25:58.853400 2645 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:25:58.860199 env[1563]: time="2024-12-13T14:25:58.860153729Z" level=info msg="StopPodSandbox for \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\"" Dec 13 14:25:58.864067 kubelet[2645]: I1213 14:25:58.863152 2645 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:25:58.864224 env[1563]: time="2024-12-13T14:25:58.864190727Z" level=info msg="StopPodSandbox for \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\"" Dec 13 14:25:58.880322 kubelet[2645]: I1213 14:25:58.879438 2645 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:25:58.882988 env[1563]: time="2024-12-13T14:25:58.882944662Z" level=info msg="StopPodSandbox for \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\"" Dec 13 14:25:58.947316 env[1563]: time="2024-12-13T14:25:58.947247441Z" level=error msg="StopPodSandbox for \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\" failed" error="failed to destroy network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:58.947747 kubelet[2645]: E1213 14:25:58.947715 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:25:58.948366 kubelet[2645]: E1213 14:25:58.947815 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b"} Dec 13 14:25:58.948366 kubelet[2645]: E1213 14:25:58.948255 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b73bff90-b7f9-4979-8202-4d0b0fbdadf1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:25:58.948366 kubelet[2645]: E1213 14:25:58.948344 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b73bff90-b7f9-4979-8202-4d0b0fbdadf1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-q5zdp" podUID="b73bff90-b7f9-4979-8202-4d0b0fbdadf1" Dec 13 14:25:59.058110 env[1563]: time="2024-12-13T14:25:59.058037721Z" level=error msg="StopPodSandbox for \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\" failed" error="failed to destroy network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:59.059190 kubelet[2645]: E1213 14:25:59.058719 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:25:59.059190 kubelet[2645]: E1213 14:25:59.058822 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed"} Dec 13 14:25:59.059190 kubelet[2645]: E1213 14:25:59.058909 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"00f39773-a08d-4d77-9373-3af4490cf007\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:25:59.059190 kubelet[2645]: E1213 14:25:59.059155 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"00f39773-a08d-4d77-9373-3af4490cf007\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5684b959c9-4kqlh" podUID="00f39773-a08d-4d77-9373-3af4490cf007" Dec 13 14:25:59.070213 env[1563]: time="2024-12-13T14:25:59.068859493Z" level=error msg="StopPodSandbox for \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\" failed" error="failed to destroy network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:59.071055 kubelet[2645]: E1213 14:25:59.070815 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:25:59.071055 kubelet[2645]: E1213 14:25:59.070902 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27"} Dec 13 14:25:59.071055 kubelet[2645]: E1213 14:25:59.070966 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dfb2bde3-020b-4bbe-afb2-09f9d51b7e98\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:25:59.071055 kubelet[2645]: E1213 14:25:59.071029 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dfb2bde3-020b-4bbe-afb2-09f9d51b7e98\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6894cd8877-mdgpx" podUID="dfb2bde3-020b-4bbe-afb2-09f9d51b7e98" Dec 13 14:25:59.071925 env[1563]: time="2024-12-13T14:25:59.071752264Z" level=error msg="StopPodSandbox for \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\" failed" error="failed to destroy network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:59.072617 kubelet[2645]: E1213 14:25:59.072405 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:25:59.072617 kubelet[2645]: E1213 14:25:59.072463 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec"} Dec 13 14:25:59.072617 kubelet[2645]: E1213 14:25:59.072544 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7f4eab33-6c5f-495d-be39-ef9019e2885c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:25:59.072617 kubelet[2645]: E1213 14:25:59.072597 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7f4eab33-6c5f-495d-be39-ef9019e2885c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6894cd8877-5cdtx" podUID="7f4eab33-6c5f-495d-be39-ef9019e2885c" Dec 13 14:25:59.089304 env[1563]: time="2024-12-13T14:25:59.089120957Z" level=error msg="StopPodSandbox for \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\" failed" error="failed to destroy network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:59.090020 kubelet[2645]: E1213 14:25:59.089731 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:25:59.090020 kubelet[2645]: E1213 14:25:59.089796 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2"} Dec 13 14:25:59.090020 kubelet[2645]: E1213 14:25:59.089867 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"797ccd89-3053-4e0b-b83c-d48e6ae1f519\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:25:59.090020 kubelet[2645]: E1213 14:25:59.089907 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"797ccd89-3053-4e0b-b83c-d48e6ae1f519\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-s6fcz" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" Dec 13 14:25:59.095870 env[1563]: time="2024-12-13T14:25:59.095806427Z" level=error msg="StopPodSandbox for \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\" failed" error="failed to destroy network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:25:59.096113 kubelet[2645]: E1213 14:25:59.096087 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:25:59.096218 kubelet[2645]: E1213 14:25:59.096139 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca"} Dec 13 14:25:59.096218 kubelet[2645]: E1213 14:25:59.096189 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fb613f52-6627-4d24-8dbd-721f760f95a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:25:59.096349 kubelet[2645]: E1213 14:25:59.096232 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fb613f52-6627-4d24-8dbd-721f760f95a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-lbzkq" podUID="fb613f52-6627-4d24-8dbd-721f760f95a9" Dec 13 14:26:09.831414 kubelet[2645]: I1213 14:26:09.831373 2645 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:26:10.179000 audit[3717]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3717 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:10.181573 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:26:10.182112 kernel: audit: type=1325 audit(1734099970.179:1011): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3717 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:10.179000 audit[3717]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffee8a5cc90 a2=0 a3=7ffee8a5cc7c items=0 ppid=2781 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:10.190918 kernel: audit: type=1300 audit(1734099970.179:1011): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffee8a5cc90 a2=0 a3=7ffee8a5cc7c items=0 ppid=2781 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:10.179000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:10.193919 kernel: audit: type=1327 audit(1734099970.179:1011): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:10.196000 audit[3717]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3717 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:10.200856 kernel: audit: type=1325 audit(1734099970.196:1012): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3717 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:10.196000 audit[3717]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffee8a5cc90 a2=0 a3=7ffee8a5cc7c items=0 ppid=2781 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:10.211747 kernel: audit: type=1300 audit(1734099970.196:1012): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffee8a5cc90 a2=0 a3=7ffee8a5cc7c items=0 ppid=2781 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:10.211880 kernel: audit: type=1327 audit(1734099970.196:1012): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:10.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:10.510855 env[1563]: time="2024-12-13T14:26:10.510246653Z" level=info msg="StopPodSandbox for \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\"" Dec 13 14:26:10.634777 env[1563]: time="2024-12-13T14:26:10.634709245Z" level=error msg="StopPodSandbox for \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\" failed" error="failed to destroy network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:10.635363 kubelet[2645]: E1213 14:26:10.635165 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:26:10.635363 kubelet[2645]: E1213 14:26:10.635216 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27"} Dec 13 14:26:10.635363 kubelet[2645]: E1213 14:26:10.635272 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dfb2bde3-020b-4bbe-afb2-09f9d51b7e98\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:10.635363 kubelet[2645]: E1213 14:26:10.635313 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dfb2bde3-020b-4bbe-afb2-09f9d51b7e98\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6894cd8877-mdgpx" podUID="dfb2bde3-020b-4bbe-afb2-09f9d51b7e98" Dec 13 14:26:11.517454 env[1563]: time="2024-12-13T14:26:11.517399645Z" level=info msg="StopPodSandbox for \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\"" Dec 13 14:26:11.532928 env[1563]: time="2024-12-13T14:26:11.532342627Z" level=info msg="StopPodSandbox for \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\"" Dec 13 14:26:11.533307 env[1563]: time="2024-12-13T14:26:11.533247300Z" level=info msg="StopPodSandbox for \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\"" Dec 13 14:26:11.775291 env[1563]: time="2024-12-13T14:26:11.774957906Z" level=error msg="StopPodSandbox for \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\" failed" error="failed to destroy network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:11.775818 kubelet[2645]: E1213 14:26:11.775781 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:26:11.776345 kubelet[2645]: E1213 14:26:11.775839 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca"} Dec 13 14:26:11.776345 kubelet[2645]: E1213 14:26:11.775890 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fb613f52-6627-4d24-8dbd-721f760f95a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:11.776345 kubelet[2645]: E1213 14:26:11.775982 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fb613f52-6627-4d24-8dbd-721f760f95a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-lbzkq" podUID="fb613f52-6627-4d24-8dbd-721f760f95a9" Dec 13 14:26:11.778363 env[1563]: time="2024-12-13T14:26:11.778306216Z" level=error msg="StopPodSandbox for \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\" failed" error="failed to destroy network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:11.778755 kubelet[2645]: E1213 14:26:11.778712 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:26:11.778856 kubelet[2645]: E1213 14:26:11.778777 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec"} Dec 13 14:26:11.778856 kubelet[2645]: E1213 14:26:11.778849 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7f4eab33-6c5f-495d-be39-ef9019e2885c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:11.779012 kubelet[2645]: E1213 14:26:11.778905 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7f4eab33-6c5f-495d-be39-ef9019e2885c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6894cd8877-5cdtx" podUID="7f4eab33-6c5f-495d-be39-ef9019e2885c" Dec 13 14:26:11.812286 env[1563]: time="2024-12-13T14:26:11.812162813Z" level=error msg="StopPodSandbox for \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\" failed" error="failed to destroy network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:11.812818 kubelet[2645]: E1213 14:26:11.812793 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:26:11.813006 kubelet[2645]: E1213 14:26:11.812861 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b"} Dec 13 14:26:11.813107 kubelet[2645]: E1213 14:26:11.813018 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b73bff90-b7f9-4979-8202-4d0b0fbdadf1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:11.813239 kubelet[2645]: E1213 14:26:11.813115 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b73bff90-b7f9-4979-8202-4d0b0fbdadf1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-q5zdp" podUID="b73bff90-b7f9-4979-8202-4d0b0fbdadf1" Dec 13 14:26:13.513298 env[1563]: time="2024-12-13T14:26:13.513249272Z" level=info msg="StopPodSandbox for \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\"" Dec 13 14:26:13.533922 env[1563]: time="2024-12-13T14:26:13.533873728Z" level=info msg="StopPodSandbox for \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\"" Dec 13 14:26:13.661116 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1642777280.mount: Deactivated successfully. Dec 13 14:26:13.697947 env[1563]: time="2024-12-13T14:26:13.697882913Z" level=error msg="StopPodSandbox for \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\" failed" error="failed to destroy network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:13.698535 kubelet[2645]: E1213 14:26:13.698329 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:26:13.698535 kubelet[2645]: E1213 14:26:13.698378 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2"} Dec 13 14:26:13.698535 kubelet[2645]: E1213 14:26:13.698433 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"797ccd89-3053-4e0b-b83c-d48e6ae1f519\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:13.698535 kubelet[2645]: E1213 14:26:13.698477 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"797ccd89-3053-4e0b-b83c-d48e6ae1f519\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-s6fcz" podUID="797ccd89-3053-4e0b-b83c-d48e6ae1f519" Dec 13 14:26:13.705572 env[1563]: time="2024-12-13T14:26:13.705487242Z" level=error msg="StopPodSandbox for \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\" failed" error="failed to destroy network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:13.706875 kubelet[2645]: E1213 14:26:13.706337 2645 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:26:13.706875 kubelet[2645]: E1213 14:26:13.706383 2645 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed"} Dec 13 14:26:13.706875 kubelet[2645]: E1213 14:26:13.706441 2645 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"00f39773-a08d-4d77-9373-3af4490cf007\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:13.706875 kubelet[2645]: E1213 14:26:13.706499 2645 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"00f39773-a08d-4d77-9373-3af4490cf007\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5684b959c9-4kqlh" podUID="00f39773-a08d-4d77-9373-3af4490cf007" Dec 13 14:26:13.765082 env[1563]: time="2024-12-13T14:26:13.764941291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:13.784045 env[1563]: time="2024-12-13T14:26:13.783654953Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:13.787417 env[1563]: time="2024-12-13T14:26:13.787256905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:13.793707 env[1563]: time="2024-12-13T14:26:13.792188446Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:13.793707 env[1563]: time="2024-12-13T14:26:13.792495765Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:26:13.869836 env[1563]: time="2024-12-13T14:26:13.869774347Z" level=info msg="CreateContainer within sandbox \"32cb438237d7d842f96ae5e5f71ecc7bc4bc79f08dcf5cc7043cf53926c20963\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:26:13.910436 env[1563]: time="2024-12-13T14:26:13.910382534Z" level=info msg="CreateContainer within sandbox \"32cb438237d7d842f96ae5e5f71ecc7bc4bc79f08dcf5cc7043cf53926c20963\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"09cfbf1e65fbd834eb956c1ab5fa65cdcdc98b9da9bf8f7a15d00e3f45c06b8c\"" Dec 13 14:26:13.914681 env[1563]: time="2024-12-13T14:26:13.914507561Z" level=info msg="StartContainer for \"09cfbf1e65fbd834eb956c1ab5fa65cdcdc98b9da9bf8f7a15d00e3f45c06b8c\"" Dec 13 14:26:14.012575 systemd[1]: Started cri-containerd-09cfbf1e65fbd834eb956c1ab5fa65cdcdc98b9da9bf8f7a15d00e3f45c06b8c.scope. Dec 13 14:26:14.044000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.051742 kernel: audit: type=1400 audit(1734099974.044:1013): avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.051845 kernel: audit: type=1300 audit(1734099974.044:1013): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe30794c808 items=0 ppid=3094 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.044000 audit[3846]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe30794c808 items=0 ppid=3094 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.067646 kernel: audit: type=1327 audit(1734099974.044:1013): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039636662663165363566626438333465623935366331616235666136 Dec 13 14:26:14.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039636662663165363566626438333465623935366331616235666136 Dec 13 14:26:14.054000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.074752 kernel: audit: type=1400 audit(1734099974.054:1014): avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit: BPF prog-id=139 op=LOAD Dec 13 14:26:14.054000 audit[3846]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003923c8 items=0 ppid=3094 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039636662663165363566626438333465623935366331616235666136 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit: BPF prog-id=140 op=LOAD Dec 13 14:26:14.068000 audit[3846]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000392418 items=0 ppid=3094 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039636662663165363566626438333465623935366331616235666136 Dec 13 14:26:14.068000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:26:14.068000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.068000 audit: BPF prog-id=141 op=LOAD Dec 13 14:26:14.068000 audit[3846]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003924a8 items=0 ppid=3094 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039636662663165363566626438333465623935366331616235666136 Dec 13 14:26:14.099566 env[1563]: time="2024-12-13T14:26:14.099515381Z" level=info msg="StartContainer for \"09cfbf1e65fbd834eb956c1ab5fa65cdcdc98b9da9bf8f7a15d00e3f45c06b8c\" returns successfully" Dec 13 14:26:14.773192 systemd[1]: Started sshd@7-172.31.28.110:22-139.178.89.65:44960.service. Dec 13 14:26:14.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.110:22-139.178.89.65:44960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:15.056000 audit[3877]: USER_ACCT pid=3877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:15.061735 sshd[3877]: Accepted publickey for core from 139.178.89.65 port 44960 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:15.061000 audit[3877]: CRED_ACQ pid=3877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:15.061000 audit[3877]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefa160e90 a2=3 a3=0 items=0 ppid=1 pid=3877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:15.061000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:15.064947 sshd[3877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:15.078653 systemd[1]: Started session-8.scope. Dec 13 14:26:15.079562 systemd-logind[1556]: New session 8 of user core. Dec 13 14:26:15.099000 audit[3877]: USER_START pid=3877 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:15.103000 audit[3881]: CRED_ACQ pid=3881 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:15.216844 systemd[1]: run-containerd-runc-k8s.io-09cfbf1e65fbd834eb956c1ab5fa65cdcdc98b9da9bf8f7a15d00e3f45c06b8c-runc.zhsWwg.mount: Deactivated successfully. Dec 13 14:26:15.301184 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:26:15.301569 kernel: audit: type=1400 audit(1734099975.281:1025): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:15.281000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:15.301770 kubelet[2645]: I1213 14:26:15.284316 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-d5xtt" podStartSLOduration=2.963886165 podStartE2EDuration="32.254759713s" podCreationTimestamp="2024-12-13 14:25:43 +0000 UTC" firstStartedPulling="2024-12-13 14:25:44.503952029 +0000 UTC m=+21.286166838" lastFinishedPulling="2024-12-13 14:26:13.794825563 +0000 UTC m=+50.577040386" observedRunningTime="2024-12-13 14:26:15.200464364 +0000 UTC m=+51.982679196" watchObservedRunningTime="2024-12-13 14:26:15.254759713 +0000 UTC m=+52.036974545" Dec 13 14:26:15.281000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:15.307783 kernel: audit: type=1400 audit(1734099975.281:1026): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:15.281000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bbd020 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:26:15.320306 kernel: audit: type=1300 audit(1734099975.281:1026): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bbd020 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:26:15.281000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:15.326887 kernel: audit: type=1327 audit(1734099975.281:1026): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:15.281000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001291920 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:26:15.340790 kernel: audit: type=1300 audit(1734099975.281:1025): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001291920 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:26:15.340921 kernel: audit: type=1327 audit(1734099975.281:1025): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:15.281000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:15.446173 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:26:15.446328 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:26:15.908749 sshd[3877]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:15.908000 audit[3877]: USER_END pid=3877 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:15.913905 systemd[1]: sshd@7-172.31.28.110:22-139.178.89.65:44960.service: Deactivated successfully. Dec 13 14:26:15.915614 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:26:15.918264 kernel: audit: type=1106 audit(1734099975.908:1027): pid=3877 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:15.918406 kernel: audit: type=1104 audit(1734099975.909:1028): pid=3877 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:15.909000 audit[3877]: CRED_DISP pid=3877 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:15.922896 systemd-logind[1556]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:26:15.923807 kernel: audit: type=1131 audit(1734099975.913:1029): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.110:22-139.178.89.65:44960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:15.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.110:22-139.178.89.65:44960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:15.924607 systemd-logind[1556]: Removed session 8. Dec 13 14:26:17.139000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:17.152233 kernel: audit: type=1400 audit(1734099977.139:1030): avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:17.139000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:17.139000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0097c9500 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:26:17.139000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:26:17.139000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c009c257a0 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:26:17.139000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:26:17.152000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:17.152000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c009cdbe60 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:26:17.152000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:26:17.152000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:17.152000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c009c25830 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:26:17.152000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:26:17.166000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:17.166000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:17.166000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c009c25b30 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:26:17.166000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:26:17.166000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0097c9820 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:26:17.166000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:26:17.481000 audit[4001]: AVC avc: denied { write } for pid=4001 comm="tee" name="fd" dev="proc" ino=25967 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:17.481000 audit[4001]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb03b6a1d a2=241 a3=1b6 items=1 ppid=3966 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:17.481000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:26:17.481000 audit: PATH item=0 name="/dev/fd/63" inode=25964 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:17.481000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:17.495000 audit[4005]: AVC avc: denied { write } for pid=4005 comm="tee" name="fd" dev="proc" ino=25978 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:17.495000 audit[4005]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7970ea1c a2=241 a3=1b6 items=1 ppid=3965 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:17.497000 audit[4018]: AVC avc: denied { write } for pid=4018 comm="tee" name="fd" dev="proc" ino=25449 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:17.497000 audit[4018]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc55134a1c a2=241 a3=1b6 items=1 ppid=3973 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:17.497000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:26:17.497000 audit: PATH item=0 name="/dev/fd/63" inode=25446 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:17.497000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:17.495000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:26:17.495000 audit: PATH item=0 name="/dev/fd/63" inode=25442 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:17.495000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:17.522000 audit[4010]: AVC avc: denied { write } for pid=4010 comm="tee" name="fd" dev="proc" ino=25453 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:17.522000 audit[4010]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff69b8da1c a2=241 a3=1b6 items=1 ppid=3974 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:17.522000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:26:17.522000 audit: PATH item=0 name="/dev/fd/63" inode=25969 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:17.522000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:17.531000 audit[4021]: AVC avc: denied { write } for pid=4021 comm="tee" name="fd" dev="proc" ino=25990 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:17.534000 audit[3994]: AVC avc: denied { write } for pid=3994 comm="tee" name="fd" dev="proc" ino=25991 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:17.534000 audit[3994]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdfab9fa0d a2=241 a3=1b6 items=1 ppid=3975 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:17.534000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:26:17.534000 audit: PATH item=0 name="/dev/fd/63" inode=25954 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:17.534000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:17.531000 audit[4021]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3add1a0c a2=241 a3=1b6 items=1 ppid=3968 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:17.531000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:26:17.531000 audit: PATH item=0 name="/dev/fd/63" inode=25982 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:17.531000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:17.581000 audit[4037]: AVC avc: denied { write } for pid=4037 comm="tee" name="fd" dev="proc" ino=25999 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:17.581000 audit[4037]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe886aca1e a2=241 a3=1b6 items=1 ppid=3979 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:17.581000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:26:17.581000 audit: PATH item=0 name="/dev/fd/63" inode=25994 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:17.581000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:18.018000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.018000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.018000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.018000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.018000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.018000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.018000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.018000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.018000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.018000 audit: BPF prog-id=142 op=LOAD Dec 13 14:26:18.018000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff82e48c20 a2=98 a3=3 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.018000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.018000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit: BPF prog-id=143 op=LOAD Dec 13 14:26:18.020000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff82e48a00 a2=74 a3=540051 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.020000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.020000 audit: BPF prog-id=144 op=LOAD Dec 13 14:26:18.020000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff82e48a30 a2=94 a3=2 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.020000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.020000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:26:18.367000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.367000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.367000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.367000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.367000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.367000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.367000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.367000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.367000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.367000 audit: BPF prog-id=145 op=LOAD Dec 13 14:26:18.367000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff82e488f0 a2=40 a3=1 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.367000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.372000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:26:18.372000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.372000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff82e489c0 a2=50 a3=7fff82e48aa0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.372000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.386000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.386000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82e48900 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.386000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.386000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff82e48930 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.386000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.386000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff82e48840 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.386000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.386000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82e48950 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.386000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.386000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82e48930 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.386000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.386000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82e48920 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.386000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.386000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82e48950 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.386000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.386000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff82e48930 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.386000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.386000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff82e48950 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.386000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.386000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff82e48920 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff82e48990 a2=28 a3=0 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff82e48740 a2=50 a3=1 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit: BPF prog-id=146 op=LOAD Dec 13 14:26:18.387000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff82e48740 a2=94 a3=5 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.387000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff82e487f0 a2=50 a3=1 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff82e48910 a2=4 a3=38 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.387000 audit[4057]: AVC avc: denied { confidentiality } for pid=4057 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:18.387000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff82e48960 a2=94 a3=6 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.388000 audit[4057]: AVC avc: denied { confidentiality } for pid=4057 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:18.388000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff82e48110 a2=94 a3=83 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.389000 audit[4057]: AVC avc: denied { confidentiality } for pid=4057 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:18.389000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff82e48110 a2=94 a3=83 items=0 ppid=3967 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit: BPF prog-id=147 op=LOAD Dec 13 14:26:18.410000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc731aea50 a2=98 a3=1999999999999999 items=0 ppid=3967 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.410000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:26:18.410000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit: BPF prog-id=148 op=LOAD Dec 13 14:26:18.410000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc731ae930 a2=74 a3=ffff items=0 ppid=3967 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.410000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:26:18.410000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { perfmon } for pid=4077 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit[4077]: AVC avc: denied { bpf } for pid=4077 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.410000 audit: BPF prog-id=149 op=LOAD Dec 13 14:26:18.410000 audit[4077]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc731ae970 a2=40 a3=7ffc731aeb50 items=0 ppid=3967 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.410000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:26:18.410000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:26:18.556657 (udev-worker)[4097]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:26:18.566462 systemd-networkd[1288]: vxlan.calico: Link UP Dec 13 14:26:18.566473 systemd-networkd[1288]: vxlan.calico: Gained carrier Dec 13 14:26:18.685382 (udev-worker)[4095]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit: BPF prog-id=150 op=LOAD Dec 13 14:26:18.695000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1e077150 a2=98 a3=ffffffff items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.695000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.695000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.695000 audit: BPF prog-id=151 op=LOAD Dec 13 14:26:18.695000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1e076f60 a2=74 a3=540051 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.695000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit: BPF prog-id=152 op=LOAD Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1e076f90 a2=94 a3=2 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1e076e60 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1e076e90 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1e076da0 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1e076eb0 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1e076e90 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1e076e80 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1e076eb0 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1e076e90 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1e076eb0 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1e076e80 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe1e076ef0 a2=28 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.696000 audit: BPF prog-id=153 op=LOAD Dec 13 14:26:18.696000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1e076d60 a2=40 a3=0 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.696000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe1e076d50 a2=50 a3=2800 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe1e076d50 a2=50 a3=2800 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit: BPF prog-id=154 op=LOAD Dec 13 14:26:18.697000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1e076570 a2=94 a3=2 items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.697000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.697000 audit: BPF prog-id=155 op=LOAD Dec 13 14:26:18.697000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1e076670 a2=94 a3=2d items=0 ppid=3967 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit: BPF prog-id=156 op=LOAD Dec 13 14:26:18.711000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe289260a0 a2=98 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.711000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit: BPF prog-id=157 op=LOAD Dec 13 14:26:18.711000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe28925e80 a2=74 a3=540051 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.711000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.711000 audit: BPF prog-id=158 op=LOAD Dec 13 14:26:18.711000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe28925eb0 a2=94 a3=2 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.711000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:26:18.863000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.863000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.863000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.863000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.863000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.863000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.863000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.863000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.863000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.863000 audit: BPF prog-id=159 op=LOAD Dec 13 14:26:18.863000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe28925d70 a2=40 a3=1 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.863000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.864000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:26:18.864000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.864000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe28925e40 a2=50 a3=7ffe28925f20 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.864000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe28925d80 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe28925db0 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe28925cc0 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe28925dd0 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe28925db0 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe28925da0 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe28925dd0 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe28925db0 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe28925dd0 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe28925da0 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe28925e10 a2=28 a3=0 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.875000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.875000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe28925bc0 a2=50 a3=1 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit: BPF prog-id=160 op=LOAD Dec 13 14:26:18.876000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe28925bc0 a2=94 a3=5 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.876000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe28925c70 a2=50 a3=1 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe28925d90 a2=4 a3=38 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { confidentiality } for pid=4113 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:18.876000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe28925de0 a2=94 a3=6 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { confidentiality } for pid=4113 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:18.876000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe28925590 a2=94 a3=83 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { perfmon } for pid=4113 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.876000 audit[4113]: AVC avc: denied { confidentiality } for pid=4113 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:18.876000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe28925590 a2=94 a3=83 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.877000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.877000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe28926fd0 a2=10 a3=f1f00800 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.877000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.877000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.877000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe28926e70 a2=10 a3=3 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.877000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.877000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.877000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe28926e10 a2=10 a3=3 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.877000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.877000 audit[4113]: AVC avc: denied { bpf } for pid=4113 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.877000 audit[4113]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe28926e10 a2=10 a3=7 items=0 ppid=3967 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.877000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:18.883000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:26:18.996000 audit[4138]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4138 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:18.996000 audit[4138]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff77352f90 a2=0 a3=7fff77352f7c items=0 ppid=3967 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.996000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:19.025000 audit[4137]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4137 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:19.025000 audit[4137]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc1617c7e0 a2=0 a3=7ffc1617c7cc items=0 ppid=3967 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.025000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:19.033000 audit[4140]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=4140 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:19.033000 audit[4140]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff36da9bb0 a2=0 a3=7fff36da9b9c items=0 ppid=3967 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.033000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:19.066000 audit[4136]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4136 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:19.066000 audit[4136]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffed8bef770 a2=0 a3=7ffed8bef75c items=0 ppid=3967 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.066000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:19.715855 systemd-networkd[1288]: vxlan.calico: Gained IPv6LL Dec 13 14:26:20.945318 systemd[1]: Started sshd@8-172.31.28.110:22-139.178.89.65:47744.service. Dec 13 14:26:20.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.110:22-139.178.89.65:47744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:20.961436 kernel: kauditd_printk_skb: 532 callbacks suppressed Dec 13 14:26:20.961737 kernel: audit: type=1130 audit(1734099980.945:1138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.110:22-139.178.89.65:47744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.186000 audit[4149]: USER_ACCT pid=4149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:21.194189 sshd[4149]: Accepted publickey for core from 139.178.89.65 port 47744 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:21.192000 audit[4149]: CRED_ACQ pid=4149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:21.197114 sshd[4149]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:21.200924 kernel: audit: type=1101 audit(1734099981.186:1139): pid=4149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:21.201011 kernel: audit: type=1103 audit(1734099981.192:1140): pid=4149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:21.204219 kernel: audit: type=1006 audit(1734099981.192:1141): pid=4149 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 14:26:21.192000 audit[4149]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe69ddde0 a2=3 a3=0 items=0 ppid=1 pid=4149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.209323 kernel: audit: type=1300 audit(1734099981.192:1141): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe69ddde0 a2=3 a3=0 items=0 ppid=1 pid=4149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.209851 kernel: audit: type=1327 audit(1734099981.192:1141): proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:21.192000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:21.217082 systemd-logind[1556]: New session 9 of user core. Dec 13 14:26:21.217801 systemd[1]: Started session-9.scope. Dec 13 14:26:21.225000 audit[4149]: USER_START pid=4149 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:21.233000 audit[4151]: CRED_ACQ pid=4151 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:21.240877 kernel: audit: type=1105 audit(1734099981.225:1142): pid=4149 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:21.241098 kernel: audit: type=1103 audit(1734099981.233:1143): pid=4151 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:21.478000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:21.478000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c73260 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:26:21.491901 kernel: audit: type=1400 audit(1734099981.478:1144): avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:21.492122 kernel: audit: type=1300 audit(1734099981.478:1144): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c73260 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:26:21.478000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:21.478000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:21.478000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c73400 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:26:21.478000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:21.479000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:21.479000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c73460 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:26:21.479000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:21.483000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:21.483000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e27d00 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:26:21.483000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:21.693650 sshd[4149]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:21.695000 audit[4149]: USER_END pid=4149 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:21.695000 audit[4149]: CRED_DISP pid=4149 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:21.698172 systemd[1]: sshd@8-172.31.28.110:22-139.178.89.65:47744.service: Deactivated successfully. Dec 13 14:26:21.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.110:22-139.178.89.65:47744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.699194 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:26:21.700135 systemd-logind[1556]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:26:21.701220 systemd-logind[1556]: Removed session 9. Dec 13 14:26:24.062816 systemd[1]: run-containerd-runc-k8s.io-09cfbf1e65fbd834eb956c1ab5fa65cdcdc98b9da9bf8f7a15d00e3f45c06b8c-runc.D3vx0Y.mount: Deactivated successfully. Dec 13 14:26:24.510889 env[1563]: time="2024-12-13T14:26:24.510841257Z" level=info msg="StopPodSandbox for \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\"" Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:24.645 [INFO][4208] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:24.646 [INFO][4208] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" iface="eth0" netns="/var/run/netns/cni-d1acf681-b341-61b5-7dd7-a7db0d570e39" Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:24.647 [INFO][4208] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" iface="eth0" netns="/var/run/netns/cni-d1acf681-b341-61b5-7dd7-a7db0d570e39" Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:24.650 [INFO][4208] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" iface="eth0" netns="/var/run/netns/cni-d1acf681-b341-61b5-7dd7-a7db0d570e39" Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:24.650 [INFO][4208] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:24.650 [INFO][4208] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:24.994 [INFO][4214] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" HandleID="k8s-pod-network.2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:24.998 [INFO][4214] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:24.999 [INFO][4214] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:25.046 [WARNING][4214] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" HandleID="k8s-pod-network.2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:25.047 [INFO][4214] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" HandleID="k8s-pod-network.2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:25.057 [INFO][4214] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:25.071899 env[1563]: 2024-12-13 14:26:25.065 [INFO][4208] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:26:25.082494 systemd[1]: run-netns-cni\x2dd1acf681\x2db341\x2d61b5\x2d7dd7\x2da7db0d570e39.mount: Deactivated successfully. Dec 13 14:26:25.084349 env[1563]: time="2024-12-13T14:26:25.084297460Z" level=info msg="TearDown network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\" successfully" Dec 13 14:26:25.084349 env[1563]: time="2024-12-13T14:26:25.084340558Z" level=info msg="StopPodSandbox for \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\" returns successfully" Dec 13 14:26:25.088938 env[1563]: time="2024-12-13T14:26:25.088882902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s6fcz,Uid:797ccd89-3053-4e0b-b83c-d48e6ae1f519,Namespace:calico-system,Attempt:1,}" Dec 13 14:26:25.451953 (udev-worker)[4239]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:26:25.457511 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:26:25.457847 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic7574345e6b: link becomes ready Dec 13 14:26:25.456846 systemd-networkd[1288]: calic7574345e6b: Link UP Dec 13 14:26:25.457257 systemd-networkd[1288]: calic7574345e6b: Gained carrier Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.231 [INFO][4220] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0 csi-node-driver- calico-system 797ccd89-3053-4e0b-b83c-d48e6ae1f519 837 0 2024-12-13 14:25:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-28-110 csi-node-driver-s6fcz eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calic7574345e6b [] []}} ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Namespace="calico-system" Pod="csi-node-driver-s6fcz" WorkloadEndpoint="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.232 [INFO][4220] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Namespace="calico-system" Pod="csi-node-driver-s6fcz" WorkloadEndpoint="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.318 [INFO][4232] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" HandleID="k8s-pod-network.6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.362 [INFO][4232] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" HandleID="k8s-pod-network.6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312780), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-28-110", "pod":"csi-node-driver-s6fcz", "timestamp":"2024-12-13 14:26:25.318399262 +0000 UTC"}, Hostname:"ip-172-31-28-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.362 [INFO][4232] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.362 [INFO][4232] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.362 [INFO][4232] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-110' Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.377 [INFO][4232] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" host="ip-172-31-28-110" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.402 [INFO][4232] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-110" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.408 [INFO][4232] ipam/ipam.go 489: Trying affinity for 192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.412 [INFO][4232] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.415 [INFO][4232] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.416 [INFO][4232] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" host="ip-172-31-28-110" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.419 [INFO][4232] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854 Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.430 [INFO][4232] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" host="ip-172-31-28-110" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.438 [INFO][4232] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.129/26] block=192.168.76.128/26 handle="k8s-pod-network.6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" host="ip-172-31-28-110" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.438 [INFO][4232] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.129/26] handle="k8s-pod-network.6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" host="ip-172-31-28-110" Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.438 [INFO][4232] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:25.493759 env[1563]: 2024-12-13 14:26:25.439 [INFO][4232] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.129/26] IPv6=[] ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" HandleID="k8s-pod-network.6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:26:25.494621 env[1563]: 2024-12-13 14:26:25.443 [INFO][4220] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Namespace="calico-system" Pod="csi-node-driver-s6fcz" WorkloadEndpoint="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"797ccd89-3053-4e0b-b83c-d48e6ae1f519", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"", Pod:"csi-node-driver-s6fcz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic7574345e6b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:25.494621 env[1563]: 2024-12-13 14:26:25.443 [INFO][4220] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.129/32] ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Namespace="calico-system" Pod="csi-node-driver-s6fcz" WorkloadEndpoint="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:26:25.494621 env[1563]: 2024-12-13 14:26:25.444 [INFO][4220] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic7574345e6b ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Namespace="calico-system" Pod="csi-node-driver-s6fcz" WorkloadEndpoint="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:26:25.494621 env[1563]: 2024-12-13 14:26:25.456 [INFO][4220] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Namespace="calico-system" Pod="csi-node-driver-s6fcz" WorkloadEndpoint="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:26:25.494621 env[1563]: 2024-12-13 14:26:25.458 [INFO][4220] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Namespace="calico-system" Pod="csi-node-driver-s6fcz" WorkloadEndpoint="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"797ccd89-3053-4e0b-b83c-d48e6ae1f519", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854", Pod:"csi-node-driver-s6fcz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic7574345e6b", MAC:"3e:46:43:3b:4f:99", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:25.494621 env[1563]: 2024-12-13 14:26:25.485 [INFO][4220] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854" Namespace="calico-system" Pod="csi-node-driver-s6fcz" WorkloadEndpoint="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:26:25.517000 audit[4253]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4253 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:25.517000 audit[4253]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff0e7ddde0 a2=0 a3=7fff0e7dddcc items=0 ppid=3967 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:25.517000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:25.520946 env[1563]: time="2024-12-13T14:26:25.519824590Z" level=info msg="StopPodSandbox for \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\"" Dec 13 14:26:25.520946 env[1563]: time="2024-12-13T14:26:25.518708090Z" level=info msg="StopPodSandbox for \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\"" Dec 13 14:26:25.520946 env[1563]: time="2024-12-13T14:26:25.520834131Z" level=info msg="StopPodSandbox for \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\"" Dec 13 14:26:25.553522 env[1563]: time="2024-12-13T14:26:25.547556550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:25.553522 env[1563]: time="2024-12-13T14:26:25.547641180Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:25.553522 env[1563]: time="2024-12-13T14:26:25.547657781Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:25.553522 env[1563]: time="2024-12-13T14:26:25.548052415Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854 pid=4268 runtime=io.containerd.runc.v2 Dec 13 14:26:25.596928 systemd[1]: Started cri-containerd-6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854.scope. Dec 13 14:26:25.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.683000 audit: BPF prog-id=161 op=LOAD Dec 13 14:26:25.686000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.686000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4268 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:25.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664303663376139303133653835383935373437336631626137366365 Dec 13 14:26:25.687000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.687000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4268 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:25.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664303663376139303133653835383935373437336631626137366365 Dec 13 14:26:25.688000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.688000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.688000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.688000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.688000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.688000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.688000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.688000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.688000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.688000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.688000 audit: BPF prog-id=162 op=LOAD Dec 13 14:26:25.688000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021aec0 items=0 ppid=4268 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:25.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664303663376139303133653835383935373437336631626137366365 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit: BPF prog-id=163 op=LOAD Dec 13 14:26:25.690000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021af08 items=0 ppid=4268 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:25.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664303663376139303133653835383935373437336631626137366365 Dec 13 14:26:25.690000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:26:25.690000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { perfmon } for pid=4295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit[4295]: AVC avc: denied { bpf } for pid=4295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:25.690000 audit: BPF prog-id=164 op=LOAD Dec 13 14:26:25.690000 audit[4295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021b318 items=0 ppid=4268 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:25.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664303663376139303133653835383935373437336631626137366365 Dec 13 14:26:25.741752 env[1563]: time="2024-12-13T14:26:25.741512040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s6fcz,Uid:797ccd89-3053-4e0b-b83c-d48e6ae1f519,Namespace:calico-system,Attempt:1,} returns sandbox id \"6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854\"" Dec 13 14:26:25.745093 env[1563]: time="2024-12-13T14:26:25.744976874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.819 [INFO][4329] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.819 [INFO][4329] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" iface="eth0" netns="/var/run/netns/cni-a5a48b6b-9e70-d305-7466-c80b4b9f8899" Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.820 [INFO][4329] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" iface="eth0" netns="/var/run/netns/cni-a5a48b6b-9e70-d305-7466-c80b4b9f8899" Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.820 [INFO][4329] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" iface="eth0" netns="/var/run/netns/cni-a5a48b6b-9e70-d305-7466-c80b4b9f8899" Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.821 [INFO][4329] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.821 [INFO][4329] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.908 [INFO][4363] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" HandleID="k8s-pod-network.e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.909 [INFO][4363] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.909 [INFO][4363] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.918 [WARNING][4363] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" HandleID="k8s-pod-network.e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.918 [INFO][4363] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" HandleID="k8s-pod-network.e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.920 [INFO][4363] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:25.926529 env[1563]: 2024-12-13 14:26:25.923 [INFO][4329] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:26:25.928436 env[1563]: time="2024-12-13T14:26:25.928171016Z" level=info msg="TearDown network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\" successfully" Dec 13 14:26:25.928714 env[1563]: time="2024-12-13T14:26:25.928636335Z" level=info msg="StopPodSandbox for \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\" returns successfully" Dec 13 14:26:25.929586 env[1563]: time="2024-12-13T14:26:25.929554428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q5zdp,Uid:b73bff90-b7f9-4979-8202-4d0b0fbdadf1,Namespace:kube-system,Attempt:1,}" Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.807 [INFO][4343] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.808 [INFO][4343] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" iface="eth0" netns="/var/run/netns/cni-327f3dcb-1308-d7ad-d514-7e5d375e649e" Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.808 [INFO][4343] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" iface="eth0" netns="/var/run/netns/cni-327f3dcb-1308-d7ad-d514-7e5d375e649e" Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.809 [INFO][4343] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" iface="eth0" netns="/var/run/netns/cni-327f3dcb-1308-d7ad-d514-7e5d375e649e" Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.809 [INFO][4343] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.809 [INFO][4343] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.902 [INFO][4359] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" HandleID="k8s-pod-network.c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.905 [INFO][4359] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.921 [INFO][4359] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.931 [WARNING][4359] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" HandleID="k8s-pod-network.c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.931 [INFO][4359] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" HandleID="k8s-pod-network.c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.934 [INFO][4359] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:25.952782 env[1563]: 2024-12-13 14:26:25.947 [INFO][4343] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:26:25.954347 env[1563]: time="2024-12-13T14:26:25.952994767Z" level=info msg="TearDown network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\" successfully" Dec 13 14:26:25.954347 env[1563]: time="2024-12-13T14:26:25.953032758Z" level=info msg="StopPodSandbox for \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\" returns successfully" Dec 13 14:26:25.954347 env[1563]: time="2024-12-13T14:26:25.954191328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6894cd8877-5cdtx,Uid:7f4eab33-6c5f-495d-be39-ef9019e2885c,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.856 [INFO][4328] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.856 [INFO][4328] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" iface="eth0" netns="/var/run/netns/cni-e4943593-ab24-58de-de78-eb68e07c78ec" Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.857 [INFO][4328] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" iface="eth0" netns="/var/run/netns/cni-e4943593-ab24-58de-de78-eb68e07c78ec" Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.857 [INFO][4328] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" iface="eth0" netns="/var/run/netns/cni-e4943593-ab24-58de-de78-eb68e07c78ec" Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.857 [INFO][4328] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.857 [INFO][4328] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.952 [INFO][4367] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" HandleID="k8s-pod-network.791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.953 [INFO][4367] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.953 [INFO][4367] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.981 [WARNING][4367] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" HandleID="k8s-pod-network.791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.981 [INFO][4367] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" HandleID="k8s-pod-network.791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.989 [INFO][4367] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:25.997791 env[1563]: 2024-12-13 14:26:25.993 [INFO][4328] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:26:26.001732 env[1563]: time="2024-12-13T14:26:26.001595056Z" level=info msg="TearDown network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\" successfully" Dec 13 14:26:26.001732 env[1563]: time="2024-12-13T14:26:26.001730175Z" level=info msg="StopPodSandbox for \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\" returns successfully" Dec 13 14:26:26.003624 env[1563]: time="2024-12-13T14:26:26.003585776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6894cd8877-mdgpx,Uid:dfb2bde3-020b-4bbe-afb2-09f9d51b7e98,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:26:26.084209 systemd[1]: run-netns-cni\x2d327f3dcb\x2d1308\x2dd7ad\x2dd514\x2d7e5d375e649e.mount: Deactivated successfully. Dec 13 14:26:26.084393 systemd[1]: run-netns-cni\x2da5a48b6b\x2d9e70\x2dd305\x2d7466\x2dc80b4b9f8899.mount: Deactivated successfully. Dec 13 14:26:26.084470 systemd[1]: run-netns-cni\x2de4943593\x2dab24\x2d58de\x2dde78\x2deb68e07c78ec.mount: Deactivated successfully. Dec 13 14:26:26.276186 (udev-worker)[4241]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:26:26.277461 systemd-networkd[1288]: cali5c9b824aba2: Link UP Dec 13 14:26:26.291395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5c9b824aba2: link becomes ready Dec 13 14:26:26.291100 systemd-networkd[1288]: cali5c9b824aba2: Gained carrier Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.071 [INFO][4377] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0 coredns-76f75df574- kube-system b73bff90-b7f9-4979-8202-4d0b0fbdadf1 853 0 2024-12-13 14:25:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-28-110 coredns-76f75df574-q5zdp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5c9b824aba2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Namespace="kube-system" Pod="coredns-76f75df574-q5zdp" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.071 [INFO][4377] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Namespace="kube-system" Pod="coredns-76f75df574-q5zdp" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.177 [INFO][4413] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" HandleID="k8s-pod-network.af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.213 [INFO][4413] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" HandleID="k8s-pod-network.af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003111d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-28-110", "pod":"coredns-76f75df574-q5zdp", "timestamp":"2024-12-13 14:26:26.177570972 +0000 UTC"}, Hostname:"ip-172-31-28-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.213 [INFO][4413] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.214 [INFO][4413] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.214 [INFO][4413] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-110' Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.216 [INFO][4413] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" host="ip-172-31-28-110" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.224 [INFO][4413] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-110" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.235 [INFO][4413] ipam/ipam.go 489: Trying affinity for 192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.238 [INFO][4413] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.243 [INFO][4413] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.243 [INFO][4413] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" host="ip-172-31-28-110" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.246 [INFO][4413] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3 Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.255 [INFO][4413] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" host="ip-172-31-28-110" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.268 [INFO][4413] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.130/26] block=192.168.76.128/26 handle="k8s-pod-network.af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" host="ip-172-31-28-110" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.268 [INFO][4413] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.130/26] handle="k8s-pod-network.af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" host="ip-172-31-28-110" Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.268 [INFO][4413] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:26.334809 env[1563]: 2024-12-13 14:26:26.268 [INFO][4413] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.130/26] IPv6=[] ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" HandleID="k8s-pod-network.af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:26:26.336462 env[1563]: 2024-12-13 14:26:26.273 [INFO][4377] cni-plugin/k8s.go 386: Populated endpoint ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Namespace="kube-system" Pod="coredns-76f75df574-q5zdp" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b73bff90-b7f9-4979-8202-4d0b0fbdadf1", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"", Pod:"coredns-76f75df574-q5zdp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5c9b824aba2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:26.336462 env[1563]: 2024-12-13 14:26:26.273 [INFO][4377] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.130/32] ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Namespace="kube-system" Pod="coredns-76f75df574-q5zdp" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:26:26.336462 env[1563]: 2024-12-13 14:26:26.273 [INFO][4377] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5c9b824aba2 ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Namespace="kube-system" Pod="coredns-76f75df574-q5zdp" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:26:26.336462 env[1563]: 2024-12-13 14:26:26.295 [INFO][4377] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Namespace="kube-system" Pod="coredns-76f75df574-q5zdp" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:26:26.336462 env[1563]: 2024-12-13 14:26:26.296 [INFO][4377] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Namespace="kube-system" Pod="coredns-76f75df574-q5zdp" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b73bff90-b7f9-4979-8202-4d0b0fbdadf1", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3", Pod:"coredns-76f75df574-q5zdp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5c9b824aba2", MAC:"ee:a2:b2:a2:0b:4c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:26.336462 env[1563]: 2024-12-13 14:26:26.330 [INFO][4377] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3" Namespace="kube-system" Pod="coredns-76f75df574-q5zdp" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:26:26.388426 env[1563]: time="2024-12-13T14:26:26.388338901Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:26.390905 env[1563]: time="2024-12-13T14:26:26.390828574Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:26.391070 env[1563]: time="2024-12-13T14:26:26.390932846Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:26.394546 env[1563]: time="2024-12-13T14:26:26.394450108Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3 pid=4455 runtime=io.containerd.runc.v2 Dec 13 14:26:26.448214 systemd[1]: Started cri-containerd-af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3.scope. Dec 13 14:26:26.483503 systemd[1]: run-containerd-runc-k8s.io-af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3-runc.QixXQT.mount: Deactivated successfully. Dec 13 14:26:26.502447 systemd-networkd[1288]: cali285559472fd: Link UP Dec 13 14:26:26.515592 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:26:26.519740 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali285559472fd: link becomes ready Dec 13 14:26:26.518595 systemd-networkd[1288]: cali285559472fd: Gained carrier Dec 13 14:26:26.520634 env[1563]: time="2024-12-13T14:26:26.520595234Z" level=info msg="StopPodSandbox for \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\"" Dec 13 14:26:26.520000 audit[4474]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4474 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:26.531119 kernel: kauditd_printk_skb: 73 callbacks suppressed Dec 13 14:26:26.531221 kernel: audit: type=1325 audit(1734099986.520:1170): table=filter:102 family=2 entries=38 op=nft_register_chain pid=4474 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:26.520000 audit[4474]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffea1a93ce0 a2=0 a3=7ffea1a93ccc items=0 ppid=3967 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.543293 kernel: audit: type=1300 audit(1734099986.520:1170): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffea1a93ce0 a2=0 a3=7ffea1a93ccc items=0 ppid=3967 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.543453 kernel: audit: type=1327 audit(1734099986.520:1170): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:26.520000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.150 [INFO][4387] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0 calico-apiserver-6894cd8877- calico-apiserver 7f4eab33-6c5f-495d-be39-ef9019e2885c 852 0 2024-12-13 14:25:43 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6894cd8877 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-28-110 calico-apiserver-6894cd8877-5cdtx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali285559472fd [] []}} ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-5cdtx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.150 [INFO][4387] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-5cdtx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.331 [INFO][4419] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" HandleID="k8s-pod-network.2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.375 [INFO][4419] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" HandleID="k8s-pod-network.2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003114e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-28-110", "pod":"calico-apiserver-6894cd8877-5cdtx", "timestamp":"2024-12-13 14:26:26.328493942 +0000 UTC"}, Hostname:"ip-172-31-28-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.375 [INFO][4419] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.375 [INFO][4419] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.375 [INFO][4419] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-110' Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.379 [INFO][4419] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" host="ip-172-31-28-110" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.394 [INFO][4419] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-110" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.407 [INFO][4419] ipam/ipam.go 489: Trying affinity for 192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.411 [INFO][4419] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.417 [INFO][4419] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.418 [INFO][4419] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" host="ip-172-31-28-110" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.434 [INFO][4419] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1 Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.446 [INFO][4419] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" host="ip-172-31-28-110" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.471 [INFO][4419] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.131/26] block=192.168.76.128/26 handle="k8s-pod-network.2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" host="ip-172-31-28-110" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.471 [INFO][4419] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.131/26] handle="k8s-pod-network.2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" host="ip-172-31-28-110" Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.471 [INFO][4419] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:26.578655 env[1563]: 2024-12-13 14:26:26.471 [INFO][4419] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.131/26] IPv6=[] ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" HandleID="k8s-pod-network.2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:26:26.580958 env[1563]: 2024-12-13 14:26:26.482 [INFO][4387] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-5cdtx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0", GenerateName:"calico-apiserver-6894cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"7f4eab33-6c5f-495d-be39-ef9019e2885c", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6894cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"", Pod:"calico-apiserver-6894cd8877-5cdtx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali285559472fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:26.580958 env[1563]: 2024-12-13 14:26:26.483 [INFO][4387] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.131/32] ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-5cdtx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:26:26.580958 env[1563]: 2024-12-13 14:26:26.483 [INFO][4387] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali285559472fd ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-5cdtx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:26:26.580958 env[1563]: 2024-12-13 14:26:26.510 [INFO][4387] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-5cdtx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:26:26.580958 env[1563]: 2024-12-13 14:26:26.511 [INFO][4387] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-5cdtx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0", GenerateName:"calico-apiserver-6894cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"7f4eab33-6c5f-495d-be39-ef9019e2885c", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6894cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1", Pod:"calico-apiserver-6894cd8877-5cdtx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali285559472fd", MAC:"ca:d4:75:e2:4d:24", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:26.580958 env[1563]: 2024-12-13 14:26:26.573 [INFO][4387] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-5cdtx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:26:26.610851 kernel: audit: type=1400 audit(1734099986.593:1171): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.611000 kernel: audit: type=1400 audit(1734099986.593:1172): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.611043 kernel: audit: type=1400 audit(1734099986.593:1173): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.629706 kernel: audit: type=1400 audit(1734099986.593:1174): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.629800 kernel: audit: type=1400 audit(1734099986.593:1175): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.657222 kernel: audit: type=1400 audit(1734099986.593:1176): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.657720 kernel: audit: type=1400 audit(1734099986.593:1177): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.594000 audit: BPF prog-id=165 op=LOAD Dec 13 14:26:26.612000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.612000 audit[4466]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4455 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366266346531626336366539386531386530396334303966623938 Dec 13 14:26:26.612000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.612000 audit[4466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4455 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366266346531626336366539386531386530396334303966623938 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit: BPF prog-id=166 op=LOAD Dec 13 14:26:26.613000 audit[4466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c9910 items=0 ppid=4455 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366266346531626336366539386531386530396334303966623938 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit: BPF prog-id=167 op=LOAD Dec 13 14:26:26.613000 audit[4466]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c9958 items=0 ppid=4455 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366266346531626336366539386531386530396334303966623938 Dec 13 14:26:26.613000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:26:26.613000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { perfmon } for pid=4466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit[4466]: AVC avc: denied { bpf } for pid=4466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.613000 audit: BPF prog-id=168 op=LOAD Dec 13 14:26:26.613000 audit[4466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c9d68 items=0 ppid=4455 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166366266346531626336366539386531386530396334303966623938 Dec 13 14:26:26.679490 systemd-networkd[1288]: cali64afe7dff74: Link UP Dec 13 14:26:26.685161 systemd-networkd[1288]: cali64afe7dff74: Gained carrier Dec 13 14:26:26.685705 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali64afe7dff74: link becomes ready Dec 13 14:26:26.723157 systemd[1]: Started sshd@9-172.31.28.110:22-139.178.89.65:47756.service. Dec 13 14:26:26.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.110:22-139.178.89.65:47756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.224 [INFO][4400] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0 calico-apiserver-6894cd8877- calico-apiserver dfb2bde3-020b-4bbe-afb2-09f9d51b7e98 854 0 2024-12-13 14:25:43 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6894cd8877 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-28-110 calico-apiserver-6894cd8877-mdgpx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali64afe7dff74 [] []}} ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-mdgpx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.224 [INFO][4400] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-mdgpx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.345 [INFO][4427] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" HandleID="k8s-pod-network.755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.376 [INFO][4427] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" HandleID="k8s-pod-network.755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291c00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-28-110", "pod":"calico-apiserver-6894cd8877-mdgpx", "timestamp":"2024-12-13 14:26:26.345608052 +0000 UTC"}, Hostname:"ip-172-31-28-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.376 [INFO][4427] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.472 [INFO][4427] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.472 [INFO][4427] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-110' Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.484 [INFO][4427] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" host="ip-172-31-28-110" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.505 [INFO][4427] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-110" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.545 [INFO][4427] ipam/ipam.go 489: Trying affinity for 192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.551 [INFO][4427] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.568 [INFO][4427] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.568 [INFO][4427] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" host="ip-172-31-28-110" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.575 [INFO][4427] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36 Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.584 [INFO][4427] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" host="ip-172-31-28-110" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.601 [INFO][4427] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.132/26] block=192.168.76.128/26 handle="k8s-pod-network.755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" host="ip-172-31-28-110" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.601 [INFO][4427] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.132/26] handle="k8s-pod-network.755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" host="ip-172-31-28-110" Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.601 [INFO][4427] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:26.742780 env[1563]: 2024-12-13 14:26:26.602 [INFO][4427] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.132/26] IPv6=[] ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" HandleID="k8s-pod-network.755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:26:26.743877 env[1563]: 2024-12-13 14:26:26.611 [INFO][4400] cni-plugin/k8s.go 386: Populated endpoint ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-mdgpx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0", GenerateName:"calico-apiserver-6894cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"dfb2bde3-020b-4bbe-afb2-09f9d51b7e98", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6894cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"", Pod:"calico-apiserver-6894cd8877-mdgpx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali64afe7dff74", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:26.743877 env[1563]: 2024-12-13 14:26:26.611 [INFO][4400] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.132/32] ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-mdgpx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:26:26.743877 env[1563]: 2024-12-13 14:26:26.611 [INFO][4400] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali64afe7dff74 ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-mdgpx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:26:26.743877 env[1563]: 2024-12-13 14:26:26.685 [INFO][4400] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-mdgpx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:26:26.743877 env[1563]: 2024-12-13 14:26:26.688 [INFO][4400] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-mdgpx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0", GenerateName:"calico-apiserver-6894cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"dfb2bde3-020b-4bbe-afb2-09f9d51b7e98", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6894cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36", Pod:"calico-apiserver-6894cd8877-mdgpx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali64afe7dff74", MAC:"96:f6:be:4d:8f:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:26.743877 env[1563]: 2024-12-13 14:26:26.733 [INFO][4400] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36" Namespace="calico-apiserver" Pod="calico-apiserver-6894cd8877-mdgpx" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:26:26.751000 audit[4513]: NETFILTER_CFG table=filter:103 family=2 entries=48 op=nft_register_chain pid=4513 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:26.751000 audit[4513]: SYSCALL arch=c000003e syscall=46 success=yes exit=25868 a0=3 a1=7ffc8bb282e0 a2=0 a3=7ffc8bb282cc items=0 ppid=3967 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.751000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:26.826000 audit[4542]: NETFILTER_CFG table=filter:104 family=2 entries=42 op=nft_register_chain pid=4542 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:26.826000 audit[4542]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7ffdd93df4d0 a2=0 a3=7ffdd93df4bc items=0 ppid=3967 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.826000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:26.849409 env[1563]: time="2024-12-13T14:26:26.845867691Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:26.849409 env[1563]: time="2024-12-13T14:26:26.845926919Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:26.849409 env[1563]: time="2024-12-13T14:26:26.845943330Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:26.855106 env[1563]: time="2024-12-13T14:26:26.855060094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q5zdp,Uid:b73bff90-b7f9-4979-8202-4d0b0fbdadf1,Namespace:kube-system,Attempt:1,} returns sandbox id \"af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3\"" Dec 13 14:26:26.858424 env[1563]: time="2024-12-13T14:26:26.857925828Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1 pid=4538 runtime=io.containerd.runc.v2 Dec 13 14:26:26.864363 env[1563]: time="2024-12-13T14:26:26.864317609Z" level=info msg="CreateContainer within sandbox \"af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:26:26.897596 env[1563]: time="2024-12-13T14:26:26.897539397Z" level=info msg="CreateContainer within sandbox \"af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c95852a36920699e7f9f89657e36eb433bceeda3eaf0948272c068d51674547a\"" Dec 13 14:26:26.900203 env[1563]: time="2024-12-13T14:26:26.900157324Z" level=info msg="StartContainer for \"c95852a36920699e7f9f89657e36eb433bceeda3eaf0948272c068d51674547a\"" Dec 13 14:26:26.900895 env[1563]: time="2024-12-13T14:26:26.897068834Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:26.900895 env[1563]: time="2024-12-13T14:26:26.897505137Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:26.900895 env[1563]: time="2024-12-13T14:26:26.897528944Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:26.900895 env[1563]: time="2024-12-13T14:26:26.898145766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36 pid=4565 runtime=io.containerd.runc.v2 Dec 13 14:26:26.921611 systemd[1]: Started cri-containerd-2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1.scope. Dec 13 14:26:26.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.965000 audit: BPF prog-id=169 op=LOAD Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4538 pid=4564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633337633965353837383662636534616635636333373133646464 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4538 pid=4564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633337633965353837383662636534616635636333373133646464 Dec 13 14:26:26.966000 audit[4519]: USER_ACCT pid=4519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit: BPF prog-id=170 op=LOAD Dec 13 14:26:26.966000 audit[4564]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001dd750 items=0 ppid=4538 pid=4564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633337633965353837383662636534616635636333373133646464 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit: BPF prog-id=171 op=LOAD Dec 13 14:26:26.966000 audit[4564]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001dd798 items=0 ppid=4538 pid=4564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633337633965353837383662636534616635636333373133646464 Dec 13 14:26:26.966000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:26:26.966000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { perfmon } for pid=4564 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit[4564]: AVC avc: denied { bpf } for pid=4564 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.966000 audit: BPF prog-id=172 op=LOAD Dec 13 14:26:26.966000 audit[4564]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001ddba8 items=0 ppid=4538 pid=4564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633337633965353837383662636534616635636333373133646464 Dec 13 14:26:26.971000 audit[4519]: CRED_ACQ pid=4519 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:26.971000 audit[4519]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3e1896d0 a2=3 a3=0 items=0 ppid=1 pid=4519 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.971000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:26.975547 sshd[4519]: Accepted publickey for core from 139.178.89.65 port 47756 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:26.973947 sshd[4519]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:26.992067 systemd[1]: Started session-10.scope. Dec 13 14:26:26.997950 systemd-logind[1556]: New session 10 of user core. Dec 13 14:26:27.001421 systemd[1]: Started cri-containerd-755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36.scope. Dec 13 14:26:27.020000 audit[4519]: USER_START pid=4519 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:27.022000 audit[4621]: CRED_ACQ pid=4621 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:27.038420 systemd[1]: Started cri-containerd-c95852a36920699e7f9f89657e36eb433bceeda3eaf0948272c068d51674547a.scope. Dec 13 14:26:27.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.066000 audit: BPF prog-id=173 op=LOAD Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4565 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353934373631396263326137663230396664363635396633656665 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4565 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353934373631396263326137663230396664363635396633656665 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit: BPF prog-id=174 op=LOAD Dec 13 14:26:27.068000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000215cd0 items=0 ppid=4565 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353934373631396263326137663230396664363635396633656665 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.068000 audit: BPF prog-id=175 op=LOAD Dec 13 14:26:27.068000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000215d18 items=0 ppid=4565 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353934373631396263326137663230396664363635396633656665 Dec 13 14:26:27.069000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:26:27.069000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:26:27.069000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.069000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.069000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.069000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.069000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.069000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.069000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.069000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.069000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.069000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.069000 audit: BPF prog-id=176 op=LOAD Dec 13 14:26:27.069000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000242128 items=0 ppid=4565 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353934373631396263326137663230396664363635396633656665 Dec 13 14:26:27.085922 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount227609795.mount: Deactivated successfully. Dec 13 14:26:27.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.103000 audit: BPF prog-id=177 op=LOAD Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4455 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353835326133363932303639396537663966383936353765333665 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4455 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353835326133363932303639396537663966383936353765333665 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.104000 audit: BPF prog-id=178 op=LOAD Dec 13 14:26:27.104000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a7100 items=0 ppid=4455 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353835326133363932303639396537663966383936353765333665 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit: BPF prog-id=179 op=LOAD Dec 13 14:26:27.105000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a7148 items=0 ppid=4455 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353835326133363932303639396537663966383936353765333665 Dec 13 14:26:27.105000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:26:27.105000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { perfmon } for pid=4611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit[4611]: AVC avc: denied { bpf } for pid=4611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:27.105000 audit: BPF prog-id=180 op=LOAD Dec 13 14:26:27.105000 audit[4611]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a7558 items=0 ppid=4455 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339353835326133363932303639396537663966383936353765333665 Dec 13 14:26:27.176747 env[1563]: time="2024-12-13T14:26:27.176685521Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6894cd8877-5cdtx,Uid:7f4eab33-6c5f-495d-be39-ef9019e2885c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1\"" Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:26.892 [INFO][4500] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:26.892 [INFO][4500] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" iface="eth0" netns="/var/run/netns/cni-f97532bf-c23c-7e63-4ba5-6e8fad704feb" Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:26.892 [INFO][4500] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" iface="eth0" netns="/var/run/netns/cni-f97532bf-c23c-7e63-4ba5-6e8fad704feb" Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:26.893 [INFO][4500] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" iface="eth0" netns="/var/run/netns/cni-f97532bf-c23c-7e63-4ba5-6e8fad704feb" Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:26.893 [INFO][4500] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:26.893 [INFO][4500] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:27.107 [INFO][4571] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" HandleID="k8s-pod-network.1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:27.107 [INFO][4571] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:27.107 [INFO][4571] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:27.161 [WARNING][4571] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" HandleID="k8s-pod-network.1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:27.161 [INFO][4571] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" HandleID="k8s-pod-network.1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:27.170 [INFO][4571] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:27.193627 env[1563]: 2024-12-13 14:26:27.188 [INFO][4500] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:26:27.212356 systemd[1]: run-netns-cni\x2df97532bf\x2dc23c\x2d7e63\x2d4ba5\x2d6e8fad704feb.mount: Deactivated successfully. Dec 13 14:26:27.216977 env[1563]: time="2024-12-13T14:26:27.216269363Z" level=info msg="TearDown network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\" successfully" Dec 13 14:26:27.216977 env[1563]: time="2024-12-13T14:26:27.216317390Z" level=info msg="StopPodSandbox for \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\" returns successfully" Dec 13 14:26:27.220857 env[1563]: time="2024-12-13T14:26:27.220813449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-lbzkq,Uid:fb613f52-6627-4d24-8dbd-721f760f95a9,Namespace:kube-system,Attempt:1,}" Dec 13 14:26:27.257926 env[1563]: time="2024-12-13T14:26:27.257875217Z" level=info msg="StartContainer for \"c95852a36920699e7f9f89657e36eb433bceeda3eaf0948272c068d51674547a\" returns successfully" Dec 13 14:26:27.268835 systemd-networkd[1288]: calic7574345e6b: Gained IPv6LL Dec 13 14:26:27.401540 env[1563]: time="2024-12-13T14:26:27.401467214Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6894cd8877-mdgpx,Uid:dfb2bde3-020b-4bbe-afb2-09f9d51b7e98,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36\"" Dec 13 14:26:27.513565 env[1563]: time="2024-12-13T14:26:27.513522612Z" level=info msg="StopPodSandbox for \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\"" Dec 13 14:26:27.606292 sshd[4519]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:27.608000 audit[4519]: USER_END pid=4519 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:27.608000 audit[4519]: CRED_DISP pid=4519 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:27.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.110:22-139.178.89.65:47756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.611212 systemd[1]: sshd@9-172.31.28.110:22-139.178.89.65:47756.service: Deactivated successfully. Dec 13 14:26:27.612149 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:26:27.621916 systemd-logind[1556]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:26:27.624777 systemd-logind[1556]: Removed session 10. Dec 13 14:26:27.633261 systemd[1]: Started sshd@10-172.31.28.110:22-139.178.89.65:47770.service. Dec 13 14:26:27.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.28.110:22-139.178.89.65:47770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.651919 systemd-networkd[1288]: cali285559472fd: Gained IPv6LL Dec 13 14:26:27.780803 systemd-networkd[1288]: cali64afe7dff74: Gained IPv6LL Dec 13 14:26:27.795605 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:26:27.795761 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali956b42db0ee: link becomes ready Dec 13 14:26:27.796020 systemd-networkd[1288]: cali956b42db0ee: Link UP Dec 13 14:26:27.796286 systemd-networkd[1288]: cali956b42db0ee: Gained carrier Dec 13 14:26:27.833000 audit[4715]: USER_ACCT pid=4715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:27.834979 sshd[4715]: Accepted publickey for core from 139.178.89.65 port 47770 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:27.837000 audit[4715]: CRED_ACQ pid=4715 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:27.837000 audit[4715]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff07a9d1c0 a2=3 a3=0 items=0 ppid=1 pid=4715 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.837000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:27.839436 sshd[4715]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:27.848833 systemd[1]: Started session-11.scope. Dec 13 14:26:27.849530 systemd-logind[1556]: New session 11 of user core. Dec 13 14:26:27.861000 audit[4715]: USER_START pid=4715 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:27.864000 audit[4735]: CRED_ACQ pid=4735 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.491 [INFO][4663] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0 coredns-76f75df574- kube-system fb613f52-6627-4d24-8dbd-721f760f95a9 872 0 2024-12-13 14:25:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-28-110 coredns-76f75df574-lbzkq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali956b42db0ee [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Namespace="kube-system" Pod="coredns-76f75df574-lbzkq" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.491 [INFO][4663] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Namespace="kube-system" Pod="coredns-76f75df574-lbzkq" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.686 [INFO][4687] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" HandleID="k8s-pod-network.03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.718 [INFO][4687] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" HandleID="k8s-pod-network.03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000285170), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-28-110", "pod":"coredns-76f75df574-lbzkq", "timestamp":"2024-12-13 14:26:27.686543327 +0000 UTC"}, Hostname:"ip-172-31-28-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.719 [INFO][4687] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.720 [INFO][4687] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.720 [INFO][4687] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-110' Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.723 [INFO][4687] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" host="ip-172-31-28-110" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.730 [INFO][4687] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-110" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.737 [INFO][4687] ipam/ipam.go 489: Trying affinity for 192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.742 [INFO][4687] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.746 [INFO][4687] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.746 [INFO][4687] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" host="ip-172-31-28-110" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.748 [INFO][4687] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15 Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.754 [INFO][4687] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" host="ip-172-31-28-110" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.766 [INFO][4687] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.133/26] block=192.168.76.128/26 handle="k8s-pod-network.03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" host="ip-172-31-28-110" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.766 [INFO][4687] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.133/26] handle="k8s-pod-network.03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" host="ip-172-31-28-110" Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.766 [INFO][4687] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:27.865994 env[1563]: 2024-12-13 14:26:27.766 [INFO][4687] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.133/26] IPv6=[] ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" HandleID="k8s-pod-network.03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:26:27.867221 env[1563]: 2024-12-13 14:26:27.771 [INFO][4663] cni-plugin/k8s.go 386: Populated endpoint ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Namespace="kube-system" Pod="coredns-76f75df574-lbzkq" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"fb613f52-6627-4d24-8dbd-721f760f95a9", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"", Pod:"coredns-76f75df574-lbzkq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali956b42db0ee", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:27.867221 env[1563]: 2024-12-13 14:26:27.771 [INFO][4663] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.133/32] ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Namespace="kube-system" Pod="coredns-76f75df574-lbzkq" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:26:27.867221 env[1563]: 2024-12-13 14:26:27.772 [INFO][4663] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali956b42db0ee ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Namespace="kube-system" Pod="coredns-76f75df574-lbzkq" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:26:27.867221 env[1563]: 2024-12-13 14:26:27.795 [INFO][4663] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Namespace="kube-system" Pod="coredns-76f75df574-lbzkq" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:26:27.867221 env[1563]: 2024-12-13 14:26:27.796 [INFO][4663] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Namespace="kube-system" Pod="coredns-76f75df574-lbzkq" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"fb613f52-6627-4d24-8dbd-721f760f95a9", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15", Pod:"coredns-76f75df574-lbzkq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali956b42db0ee", MAC:"d2:8f:66:d7:57:3c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:27.867221 env[1563]: 2024-12-13 14:26:27.839 [INFO][4663] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15" Namespace="kube-system" Pod="coredns-76f75df574-lbzkq" WorkloadEndpoint="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:26:27.889000 audit[4737]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=4737 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:27.889000 audit[4737]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7fff17b09070 a2=0 a3=7fff17b0905c items=0 ppid=3967 pid=4737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.889000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.639 [INFO][4707] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.639 [INFO][4707] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" iface="eth0" netns="/var/run/netns/cni-0d6d0436-e720-11f1-a3c6-517896c0b67b" Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.639 [INFO][4707] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" iface="eth0" netns="/var/run/netns/cni-0d6d0436-e720-11f1-a3c6-517896c0b67b" Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.640 [INFO][4707] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" iface="eth0" netns="/var/run/netns/cni-0d6d0436-e720-11f1-a3c6-517896c0b67b" Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.640 [INFO][4707] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.640 [INFO][4707] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.758 [INFO][4716] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" HandleID="k8s-pod-network.d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.758 [INFO][4716] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.771 [INFO][4716] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.835 [WARNING][4716] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" HandleID="k8s-pod-network.d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.867 [INFO][4716] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" HandleID="k8s-pod-network.d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.879 [INFO][4716] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:27.890879 env[1563]: 2024-12-13 14:26:27.887 [INFO][4707] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:26:27.894486 systemd[1]: run-netns-cni\x2d0d6d0436\x2de720\x2d11f1\x2da3c6\x2d517896c0b67b.mount: Deactivated successfully. Dec 13 14:26:27.896432 env[1563]: time="2024-12-13T14:26:27.896363505Z" level=info msg="TearDown network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\" successfully" Dec 13 14:26:27.896541 env[1563]: time="2024-12-13T14:26:27.896433444Z" level=info msg="StopPodSandbox for \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\" returns successfully" Dec 13 14:26:27.898281 env[1563]: time="2024-12-13T14:26:27.898244961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5684b959c9-4kqlh,Uid:00f39773-a08d-4d77-9373-3af4490cf007,Namespace:calico-system,Attempt:1,}" Dec 13 14:26:27.955719 env[1563]: time="2024-12-13T14:26:27.952231501Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:27.955719 env[1563]: time="2024-12-13T14:26:27.952284716Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:27.955719 env[1563]: time="2024-12-13T14:26:27.952301541Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:27.955719 env[1563]: time="2024-12-13T14:26:27.952455162Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15 pid=4753 runtime=io.containerd.runc.v2 Dec 13 14:26:28.010511 systemd[1]: Started cri-containerd-03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15.scope. Dec 13 14:26:28.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit: BPF prog-id=181 op=LOAD Dec 13 14:26:28.047000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.047000 audit[4773]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4753 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623135356530626566346566643766373037383631303935633834 Dec 13 14:26:28.048000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.048000 audit[4773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4753 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623135356530626566346566643766373037383631303935633834 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit: BPF prog-id=182 op=LOAD Dec 13 14:26:28.049000 audit[4773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c6460 items=0 ppid=4753 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623135356530626566346566643766373037383631303935633834 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit: BPF prog-id=183 op=LOAD Dec 13 14:26:28.049000 audit[4773]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c64a8 items=0 ppid=4753 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623135356530626566346566643766373037383631303935633834 Dec 13 14:26:28.049000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:26:28.049000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { perfmon } for pid=4773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit[4773]: AVC avc: denied { bpf } for pid=4773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.049000 audit: BPF prog-id=184 op=LOAD Dec 13 14:26:28.049000 audit[4773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c68b8 items=0 ppid=4753 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033623135356530626566346566643766373037383631303935633834 Dec 13 14:26:28.124276 env[1563]: time="2024-12-13T14:26:28.124232833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-lbzkq,Uid:fb613f52-6627-4d24-8dbd-721f760f95a9,Namespace:kube-system,Attempt:1,} returns sandbox id \"03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15\"" Dec 13 14:26:28.130983 env[1563]: time="2024-12-13T14:26:28.130941888Z" level=info msg="CreateContainer within sandbox \"03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:26:28.164262 systemd-networkd[1288]: cali5c9b824aba2: Gained IPv6LL Dec 13 14:26:28.316970 kubelet[2645]: I1213 14:26:28.316857 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-q5zdp" podStartSLOduration=53.316799627 podStartE2EDuration="53.316799627s" podCreationTimestamp="2024-12-13 14:25:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:26:28.297949876 +0000 UTC m=+65.080164708" watchObservedRunningTime="2024-12-13 14:26:28.316799627 +0000 UTC m=+65.099014460" Dec 13 14:26:28.334567 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3054732204.mount: Deactivated successfully. Dec 13 14:26:28.354918 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3525017888.mount: Deactivated successfully. Dec 13 14:26:28.382362 env[1563]: time="2024-12-13T14:26:28.382290093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:28.395860 env[1563]: time="2024-12-13T14:26:28.395809426Z" level=info msg="CreateContainer within sandbox \"03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3719cf05c59fd1b8b9d5bc4b7ad8632ba02a6e4c42a9ff04fb4f33a3dd6b390d\"" Dec 13 14:26:28.397620 env[1563]: time="2024-12-13T14:26:28.397584284Z" level=info msg="StartContainer for \"3719cf05c59fd1b8b9d5bc4b7ad8632ba02a6e4c42a9ff04fb4f33a3dd6b390d\"" Dec 13 14:26:28.404527 env[1563]: time="2024-12-13T14:26:28.399346628Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:28.405501 env[1563]: time="2024-12-13T14:26:28.405473940Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:28.410328 env[1563]: time="2024-12-13T14:26:28.410262148Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:28.411531 env[1563]: time="2024-12-13T14:26:28.411490477Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:26:28.423629 env[1563]: time="2024-12-13T14:26:28.423568018Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:26:28.423000 audit[4810]: NETFILTER_CFG table=filter:106 family=2 entries=16 op=nft_register_rule pid=4810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:28.423000 audit[4810]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe7bdd13d0 a2=0 a3=7ffe7bdd13bc items=0 ppid=2781 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:28.427863 env[1563]: time="2024-12-13T14:26:28.427711487Z" level=info msg="CreateContainer within sandbox \"6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:26:28.428000 audit[4810]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=4810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:28.428000 audit[4810]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe7bdd13d0 a2=0 a3=0 items=0 ppid=2781 pid=4810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:28.470000 audit[4820]: NETFILTER_CFG table=filter:108 family=2 entries=13 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:28.470000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc2e2bd9d0 a2=0 a3=7ffc2e2bd9bc items=0 ppid=2781 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:28.478000 audit[4820]: NETFILTER_CFG table=nat:109 family=2 entries=35 op=nft_register_chain pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:28.478000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc2e2bd9d0 a2=0 a3=7ffc2e2bd9bc items=0 ppid=2781 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:28.511121 env[1563]: time="2024-12-13T14:26:28.511064532Z" level=info msg="CreateContainer within sandbox \"6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7601b162395e15e8fdeee04d5e5a111956faa6ec0765f58d572dd8d62a273bc3\"" Dec 13 14:26:28.512336 env[1563]: time="2024-12-13T14:26:28.512299563Z" level=info msg="StartContainer for \"7601b162395e15e8fdeee04d5e5a111956faa6ec0765f58d572dd8d62a273bc3\"" Dec 13 14:26:28.536072 systemd[1]: Started cri-containerd-3719cf05c59fd1b8b9d5bc4b7ad8632ba02a6e4c42a9ff04fb4f33a3dd6b390d.scope. Dec 13 14:26:28.604342 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0481c3ecb85: link becomes ready Dec 13 14:26:28.603775 systemd-networkd[1288]: cali0481c3ecb85: Link UP Dec 13 14:26:28.604081 systemd-networkd[1288]: cali0481c3ecb85: Gained carrier Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.127 [INFO][4754] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0 calico-kube-controllers-5684b959c9- calico-system 00f39773-a08d-4d77-9373-3af4490cf007 879 0 2024-12-13 14:25:44 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5684b959c9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-28-110 calico-kube-controllers-5684b959c9-4kqlh eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali0481c3ecb85 [] []}} ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Namespace="calico-system" Pod="calico-kube-controllers-5684b959c9-4kqlh" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.128 [INFO][4754] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Namespace="calico-system" Pod="calico-kube-controllers-5684b959c9-4kqlh" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.461 [INFO][4804] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" HandleID="k8s-pod-network.a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.486 [INFO][4804] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" HandleID="k8s-pod-network.a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310e10), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-28-110", "pod":"calico-kube-controllers-5684b959c9-4kqlh", "timestamp":"2024-12-13 14:26:28.461385972 +0000 UTC"}, Hostname:"ip-172-31-28-110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.486 [INFO][4804] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.486 [INFO][4804] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.486 [INFO][4804] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-110' Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.489 [INFO][4804] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" host="ip-172-31-28-110" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.501 [INFO][4804] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-110" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.525 [INFO][4804] ipam/ipam.go 489: Trying affinity for 192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.538 [INFO][4804] ipam/ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.543 [INFO][4804] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ip-172-31-28-110" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.543 [INFO][4804] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" host="ip-172-31-28-110" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.546 [INFO][4804] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0 Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.556 [INFO][4804] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" host="ip-172-31-28-110" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.577 [INFO][4804] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.76.134/26] block=192.168.76.128/26 handle="k8s-pod-network.a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" host="ip-172-31-28-110" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.577 [INFO][4804] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.134/26] handle="k8s-pod-network.a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" host="ip-172-31-28-110" Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.577 [INFO][4804] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:28.651159 env[1563]: 2024-12-13 14:26:28.577 [INFO][4804] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.134/26] IPv6=[] ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" HandleID="k8s-pod-network.a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:26:28.652536 env[1563]: 2024-12-13 14:26:28.582 [INFO][4754] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Namespace="calico-system" Pod="calico-kube-controllers-5684b959c9-4kqlh" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0", GenerateName:"calico-kube-controllers-5684b959c9-", Namespace:"calico-system", SelfLink:"", UID:"00f39773-a08d-4d77-9373-3af4490cf007", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5684b959c9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"", Pod:"calico-kube-controllers-5684b959c9-4kqlh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0481c3ecb85", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:28.652536 env[1563]: 2024-12-13 14:26:28.582 [INFO][4754] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.76.134/32] ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Namespace="calico-system" Pod="calico-kube-controllers-5684b959c9-4kqlh" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:26:28.652536 env[1563]: 2024-12-13 14:26:28.582 [INFO][4754] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0481c3ecb85 ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Namespace="calico-system" Pod="calico-kube-controllers-5684b959c9-4kqlh" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:26:28.652536 env[1563]: 2024-12-13 14:26:28.600 [INFO][4754] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Namespace="calico-system" Pod="calico-kube-controllers-5684b959c9-4kqlh" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:26:28.652536 env[1563]: 2024-12-13 14:26:28.601 [INFO][4754] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Namespace="calico-system" Pod="calico-kube-controllers-5684b959c9-4kqlh" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0", GenerateName:"calico-kube-controllers-5684b959c9-", Namespace:"calico-system", SelfLink:"", UID:"00f39773-a08d-4d77-9373-3af4490cf007", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5684b959c9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0", Pod:"calico-kube-controllers-5684b959c9-4kqlh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0481c3ecb85", MAC:"be:0c:85:f7:2a:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:28.652536 env[1563]: 2024-12-13 14:26:28.641 [INFO][4754] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0" Namespace="calico-system" Pod="calico-kube-controllers-5684b959c9-4kqlh" WorkloadEndpoint="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:26:28.671543 systemd[1]: Started cri-containerd-7601b162395e15e8fdeee04d5e5a111956faa6ec0765f58d572dd8d62a273bc3.scope. Dec 13 14:26:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.680000 audit: BPF prog-id=185 op=LOAD Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4753 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337313963663035633539666431623862396435626334623761643836 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4753 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337313963663035633539666431623862396435626334623761643836 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit: BPF prog-id=186 op=LOAD Dec 13 14:26:28.681000 audit[4821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003187a0 items=0 ppid=4753 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337313963663035633539666431623862396435626334623761643836 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.681000 audit: BPF prog-id=187 op=LOAD Dec 13 14:26:28.681000 audit[4821]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003187e8 items=0 ppid=4753 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337313963663035633539666431623862396435626334623761643836 Dec 13 14:26:28.684000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:26:28.684000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:26:28.684000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.684000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.684000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.684000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.684000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.684000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.684000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.684000 audit[4821]: AVC avc: denied { perfmon } for pid=4821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.684000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.684000 audit[4821]: AVC avc: denied { bpf } for pid=4821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.684000 audit: BPF prog-id=188 op=LOAD Dec 13 14:26:28.684000 audit[4821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000318bf8 items=0 ppid=4753 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337313963663035633539666431623862396435626334623761643836 Dec 13 14:26:28.702351 sshd[4715]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:28.703000 audit[4715]: USER_END pid=4715 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:28.703000 audit[4715]: CRED_DISP pid=4715 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:28.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.28.110:22-139.178.89.65:47770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:28.712275 systemd[1]: sshd@10-172.31.28.110:22-139.178.89.65:47770.service: Deactivated successfully. Dec 13 14:26:28.713384 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:26:28.714243 systemd-logind[1556]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:26:28.715957 systemd-logind[1556]: Removed session 11. Dec 13 14:26:28.732961 env[1563]: time="2024-12-13T14:26:28.732907600Z" level=info msg="StartContainer for \"3719cf05c59fd1b8b9d5bc4b7ad8632ba02a6e4c42a9ff04fb4f33a3dd6b390d\" returns successfully" Dec 13 14:26:28.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.28.110:22-139.178.89.65:35326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:28.738399 systemd[1]: Started sshd@11-172.31.28.110:22-139.178.89.65:35326.service. Dec 13 14:26:28.757630 env[1563]: time="2024-12-13T14:26:28.757180899Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:28.757630 env[1563]: time="2024-12-13T14:26:28.757315837Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:28.757630 env[1563]: time="2024-12-13T14:26:28.757351832Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:28.757983 env[1563]: time="2024-12-13T14:26:28.757645049Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0 pid=4896 runtime=io.containerd.runc.v2 Dec 13 14:26:28.806087 systemd[1]: Started cri-containerd-a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0.scope. Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit[4838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efc24ef86e8 items=0 ppid=4268 pid=4838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303162313632333935653135653866646565653034643565356131 Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.836000 audit: BPF prog-id=189 op=LOAD Dec 13 14:26:28.836000 audit[4838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003600b8 items=0 ppid=4268 pid=4838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303162313632333935653135653866646565653034643565356131 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit: BPF prog-id=190 op=LOAD Dec 13 14:26:28.837000 audit[4838]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000360108 items=0 ppid=4268 pid=4838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303162313632333935653135653866646565653034643565356131 Dec 13 14:26:28.837000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:26:28.837000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { perfmon } for pid=4838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit[4838]: AVC avc: denied { bpf } for pid=4838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.837000 audit: BPF prog-id=191 op=LOAD Dec 13 14:26:28.837000 audit[4838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000360198 items=0 ppid=4268 pid=4838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736303162313632333935653135653866646565653034643565356131 Dec 13 14:26:28.864588 env[1563]: time="2024-12-13T14:26:28.864471417Z" level=info msg="StartContainer for \"7601b162395e15e8fdeee04d5e5a111956faa6ec0765f58d572dd8d62a273bc3\" returns successfully" Dec 13 14:26:28.887000 audit[4923]: NETFILTER_CFG table=filter:110 family=2 entries=50 op=nft_register_chain pid=4923 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:28.887000 audit[4923]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7ffd01e6f9a0 a2=0 a3=7ffd01e6f98c items=0 ppid=3967 pid=4923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.887000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:28.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.921000 audit: BPF prog-id=192 op=LOAD Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4896 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131313935663430373664616337623465336536346233666531666336 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4896 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131313935663430373664616337623465336536346233666531666336 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit: BPF prog-id=193 op=LOAD Dec 13 14:26:28.922000 audit[4905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c9420 items=0 ppid=4896 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131313935663430373664616337623465336536346233666531666336 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit: BPF prog-id=194 op=LOAD Dec 13 14:26:28.922000 audit[4905]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c9468 items=0 ppid=4896 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131313935663430373664616337623465336536346233666531666336 Dec 13 14:26:28.922000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:26:28.922000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { perfmon } for pid=4905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit[4905]: AVC avc: denied { bpf } for pid=4905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:28.922000 audit: BPF prog-id=195 op=LOAD Dec 13 14:26:28.922000 audit[4905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c9878 items=0 ppid=4896 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131313935663430373664616337623465336536346233666531666336 Dec 13 14:26:28.936000 audit[4890]: USER_ACCT pid=4890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:28.938524 sshd[4890]: Accepted publickey for core from 139.178.89.65 port 35326 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:28.938000 audit[4890]: CRED_ACQ pid=4890 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:28.938000 audit[4890]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8a915e30 a2=3 a3=0 items=0 ppid=1 pid=4890 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:28.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:28.941038 sshd[4890]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:28.950797 systemd-logind[1556]: New session 12 of user core. Dec 13 14:26:28.952392 systemd[1]: Started session-12.scope. Dec 13 14:26:28.959000 audit[4890]: USER_START pid=4890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:28.961000 audit[4935]: CRED_ACQ pid=4935 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:28.982990 env[1563]: time="2024-12-13T14:26:28.982906869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5684b959c9-4kqlh,Uid:00f39773-a08d-4d77-9373-3af4490cf007,Namespace:calico-system,Attempt:1,} returns sandbox id \"a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0\"" Dec 13 14:26:29.234224 kubelet[2645]: I1213 14:26:29.234114 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-lbzkq" podStartSLOduration=54.234051536 podStartE2EDuration="54.234051536s" podCreationTimestamp="2024-12-13 14:25:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:26:29.201966127 +0000 UTC m=+65.984180959" watchObservedRunningTime="2024-12-13 14:26:29.234051536 +0000 UTC m=+66.016266367" Dec 13 14:26:29.320942 sshd[4890]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:29.324000 audit[4890]: USER_END pid=4890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:29.324000 audit[4890]: CRED_DISP pid=4890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:29.332464 systemd-logind[1556]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:26:29.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.28.110:22-139.178.89.65:35326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:29.333755 systemd[1]: sshd@11-172.31.28.110:22-139.178.89.65:35326.service: Deactivated successfully. Dec 13 14:26:29.334908 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:26:29.338265 systemd-logind[1556]: Removed session 12. Dec 13 14:26:29.348865 systemd-networkd[1288]: cali956b42db0ee: Gained IPv6LL Dec 13 14:26:29.531000 audit[4960]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:29.531000 audit[4960]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffee15cd00 a2=0 a3=7fffee15ccec items=0 ppid=2781 pid=4960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:29.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:29.553000 audit[4960]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:29.553000 audit[4960]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffee15cd00 a2=0 a3=7fffee15ccec items=0 ppid=2781 pid=4960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:29.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:29.892932 systemd-networkd[1288]: cali0481c3ecb85: Gained IPv6LL Dec 13 14:26:32.566608 env[1563]: time="2024-12-13T14:26:32.566499490Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:32.574453 env[1563]: time="2024-12-13T14:26:32.574404367Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:32.583364 env[1563]: time="2024-12-13T14:26:32.583317531Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:32.587121 env[1563]: time="2024-12-13T14:26:32.587069259Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:32.594770 env[1563]: time="2024-12-13T14:26:32.594706583Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:26:32.602689 env[1563]: time="2024-12-13T14:26:32.599925979Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:26:32.610720 env[1563]: time="2024-12-13T14:26:32.610629517Z" level=info msg="CreateContainer within sandbox \"2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:26:32.643177 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4091439930.mount: Deactivated successfully. Dec 13 14:26:32.654143 env[1563]: time="2024-12-13T14:26:32.654090563Z" level=info msg="CreateContainer within sandbox \"2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2e16f7fec099e22a6b750655b5bc2d64a2f556be2157d51e052040114aabb106\"" Dec 13 14:26:32.655756 env[1563]: time="2024-12-13T14:26:32.654947065Z" level=info msg="StartContainer for \"2e16f7fec099e22a6b750655b5bc2d64a2f556be2157d51e052040114aabb106\"" Dec 13 14:26:32.711429 systemd[1]: run-containerd-runc-k8s.io-2e16f7fec099e22a6b750655b5bc2d64a2f556be2157d51e052040114aabb106-runc.hPKhmN.mount: Deactivated successfully. Dec 13 14:26:32.718843 systemd[1]: Started cri-containerd-2e16f7fec099e22a6b750655b5bc2d64a2f556be2157d51e052040114aabb106.scope. Dec 13 14:26:32.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.743214 kernel: kauditd_printk_skb: 498 callbacks suppressed Dec 13 14:26:32.743348 kernel: audit: type=1400 audit(1734099992.737:1340): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.743385 kernel: audit: type=1400 audit(1734099992.737:1341): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750946 kernel: audit: type=1400 audit(1734099992.737:1342): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.755469 kernel: audit: type=1400 audit(1734099992.737:1343): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.767324 kernel: audit: type=1400 audit(1734099992.737:1344): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.767409 kernel: audit: type=1400 audit(1734099992.737:1345): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.771851 kernel: audit: type=1400 audit(1734099992.737:1346): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.772811 kernel: audit: type=1400 audit(1734099992.737:1347): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.780920 kernel: audit: type=1400 audit(1734099992.737:1348): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.781634 kernel: audit: type=1400 audit(1734099992.737:1349): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.737000 audit: BPF prog-id=196 op=LOAD Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4538 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:32.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313666376665633039396532326136623735303635356235626332 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4538 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:32.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313666376665633039396532326136623735303635356235626332 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.738000 audit: BPF prog-id=197 op=LOAD Dec 13 14:26:32.738000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00039efa0 items=0 ppid=4538 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:32.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313666376665633039396532326136623735303635356235626332 Dec 13 14:26:32.746000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.746000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.746000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.746000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.746000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.746000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.746000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.746000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.746000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.746000 audit: BPF prog-id=198 op=LOAD Dec 13 14:26:32.746000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00039efe8 items=0 ppid=4538 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:32.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313666376665633039396532326136623735303635356235626332 Dec 13 14:26:32.750000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:26:32.750000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:26:32.750000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750000 audit[4971]: AVC avc: denied { perfmon } for pid=4971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750000 audit[4971]: AVC avc: denied { bpf } for pid=4971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:32.750000 audit: BPF prog-id=199 op=LOAD Dec 13 14:26:32.750000 audit[4971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00039f3f8 items=0 ppid=4538 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:32.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313666376665633039396532326136623735303635356235626332 Dec 13 14:26:32.859979 env[1563]: time="2024-12-13T14:26:32.859906290Z" level=info msg="StartContainer for \"2e16f7fec099e22a6b750655b5bc2d64a2f556be2157d51e052040114aabb106\" returns successfully" Dec 13 14:26:32.970872 env[1563]: time="2024-12-13T14:26:32.970824802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:32.978914 env[1563]: time="2024-12-13T14:26:32.977518005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:32.986569 env[1563]: time="2024-12-13T14:26:32.980242775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:32.989391 env[1563]: time="2024-12-13T14:26:32.989342354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:26:32.991890 env[1563]: time="2024-12-13T14:26:32.991844288Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:26:32.997430 env[1563]: time="2024-12-13T14:26:32.988403336Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:33.007060 env[1563]: time="2024-12-13T14:26:33.007014963Z" level=info msg="CreateContainer within sandbox \"755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:26:33.025318 env[1563]: time="2024-12-13T14:26:33.025275450Z" level=info msg="CreateContainer within sandbox \"755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9d74ca8259bd9dc2fce01f9e39f4117b6bb899b968b79a90ea1ad055a316abf5\"" Dec 13 14:26:33.027383 env[1563]: time="2024-12-13T14:26:33.027301092Z" level=info msg="StartContainer for \"9d74ca8259bd9dc2fce01f9e39f4117b6bb899b968b79a90ea1ad055a316abf5\"" Dec 13 14:26:33.072952 systemd[1]: Started cri-containerd-9d74ca8259bd9dc2fce01f9e39f4117b6bb899b968b79a90ea1ad055a316abf5.scope. Dec 13 14:26:33.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.121000 audit: BPF prog-id=200 op=LOAD Dec 13 14:26:33.125000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.125000 audit[5009]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4565 pid=5009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:33.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373463613832353962643964633266636530316639653339663431 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit[5009]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4565 pid=5009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:33.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373463613832353962643964633266636530316639653339663431 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.126000 audit: BPF prog-id=201 op=LOAD Dec 13 14:26:33.126000 audit[5009]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002866a0 items=0 ppid=4565 pid=5009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:33.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373463613832353962643964633266636530316639653339663431 Dec 13 14:26:33.127000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.127000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.127000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.127000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.127000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.127000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.127000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.127000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.127000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.127000 audit: BPF prog-id=202 op=LOAD Dec 13 14:26:33.127000 audit[5009]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002866e8 items=0 ppid=4565 pid=5009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:33.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373463613832353962643964633266636530316639653339663431 Dec 13 14:26:33.128000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:26:33.128000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:26:33.129000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.129000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.129000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.129000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.129000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.129000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.129000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.129000 audit[5009]: AVC avc: denied { perfmon } for pid=5009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.129000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.129000 audit[5009]: AVC avc: denied { bpf } for pid=5009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:33.129000 audit: BPF prog-id=203 op=LOAD Dec 13 14:26:33.129000 audit[5009]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000286af8 items=0 ppid=4565 pid=5009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:33.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373463613832353962643964633266636530316639653339663431 Dec 13 14:26:33.210585 env[1563]: time="2024-12-13T14:26:33.209898456Z" level=info msg="StartContainer for \"9d74ca8259bd9dc2fce01f9e39f4117b6bb899b968b79a90ea1ad055a316abf5\" returns successfully" Dec 13 14:26:33.248181 kubelet[2645]: I1213 14:26:33.248090 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6894cd8877-5cdtx" podStartSLOduration=44.840698388 podStartE2EDuration="50.248037003s" podCreationTimestamp="2024-12-13 14:25:43 +0000 UTC" firstStartedPulling="2024-12-13 14:26:27.187972947 +0000 UTC m=+63.970187766" lastFinishedPulling="2024-12-13 14:26:32.595311566 +0000 UTC m=+69.377526381" observedRunningTime="2024-12-13 14:26:33.246628104 +0000 UTC m=+70.028842936" watchObservedRunningTime="2024-12-13 14:26:33.248037003 +0000 UTC m=+70.030251835" Dec 13 14:26:33.330000 audit[5038]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:33.330000 audit[5038]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff9d6ac3a0 a2=0 a3=7fff9d6ac38c items=0 ppid=2781 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:33.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:33.336000 audit[5038]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:33.336000 audit[5038]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff9d6ac3a0 a2=0 a3=7fff9d6ac38c items=0 ppid=2781 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:33.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:33.362000 audit[5040]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:33.362000 audit[5040]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffda9b442c0 a2=0 a3=7ffda9b442ac items=0 ppid=2781 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:33.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:33.366000 audit[5040]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5040 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:33.366000 audit[5040]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffda9b442c0 a2=0 a3=7ffda9b442ac items=0 ppid=2781 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:33.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:34.224977 kubelet[2645]: I1213 14:26:34.224949 2645 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:26:34.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.110:22-139.178.89.65:35332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.345303 systemd[1]: Started sshd@12-172.31.28.110:22-139.178.89.65:35332.service. Dec 13 14:26:34.662308 sshd[5053]: Accepted publickey for core from 139.178.89.65 port 35332 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:34.661000 audit[5053]: USER_ACCT pid=5053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:34.663000 audit[5053]: CRED_ACQ pid=5053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:34.664000 audit[5053]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3ca581b0 a2=3 a3=0 items=0 ppid=1 pid=5053 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:34.664000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:34.668052 sshd[5053]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:34.677991 systemd[1]: Started session-13.scope. Dec 13 14:26:34.679078 systemd-logind[1556]: New session 13 of user core. Dec 13 14:26:34.688000 audit[5053]: USER_START pid=5053 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:34.690000 audit[5056]: CRED_ACQ pid=5056 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:35.171000 audit[4983]: AVC avc: denied { watch } for pid=4983 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_25_57.2589500038/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c560,c831 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c560,c831 tclass=file permissive=0 Dec 13 14:26:35.171000 audit[4983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000496d00 a2=fc6 a3=0 items=0 ppid=4538 pid=4983 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c560,c831 key=(null) Dec 13 14:26:35.171000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:26:35.482000 audit[5021]: AVC avc: denied { watch } for pid=5021 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_25_57.845800746/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c874,c938 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c874,c938 tclass=file permissive=0 Dec 13 14:26:35.482000 audit[5021]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f7f780 a2=fc6 a3=0 items=0 ppid=4565 pid=5021 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c874,c938 key=(null) Dec 13 14:26:35.482000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:26:35.568144 kubelet[2645]: I1213 14:26:35.568113 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6894cd8877-mdgpx" podStartSLOduration=46.989284238 podStartE2EDuration="52.568069913s" podCreationTimestamp="2024-12-13 14:25:43 +0000 UTC" firstStartedPulling="2024-12-13 14:26:27.411010836 +0000 UTC m=+64.193225650" lastFinishedPulling="2024-12-13 14:26:32.989796509 +0000 UTC m=+69.772011325" observedRunningTime="2024-12-13 14:26:33.307594305 +0000 UTC m=+70.089809123" watchObservedRunningTime="2024-12-13 14:26:35.568069913 +0000 UTC m=+72.350284735" Dec 13 14:26:35.654000 audit[5064]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=5064 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:35.654000 audit[5064]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd0c7f4e80 a2=0 a3=7ffd0c7f4e6c items=0 ppid=2781 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:35.654000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:35.666000 audit[5064]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=5064 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:35.666000 audit[5064]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd0c7f4e80 a2=0 a3=7ffd0c7f4e6c items=0 ppid=2781 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:35.666000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:35.726644 sshd[5053]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:35.727000 audit[5053]: USER_END pid=5053 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:35.728000 audit[5053]: CRED_DISP pid=5053 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:35.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.110:22-139.178.89.65:35332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:35.731441 systemd[1]: sshd@12-172.31.28.110:22-139.178.89.65:35332.service: Deactivated successfully. Dec 13 14:26:35.735636 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:26:35.736306 systemd-logind[1556]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:26:35.742095 systemd-logind[1556]: Removed session 13. Dec 13 14:26:36.296644 env[1563]: time="2024-12-13T14:26:36.296590796Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:36.311080 env[1563]: time="2024-12-13T14:26:36.311033855Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:36.313491 env[1563]: time="2024-12-13T14:26:36.313445629Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:36.315371 env[1563]: time="2024-12-13T14:26:36.315330921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:36.315851 env[1563]: time="2024-12-13T14:26:36.315814068Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:26:36.324243 env[1563]: time="2024-12-13T14:26:36.324122770Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:26:36.330214 env[1563]: time="2024-12-13T14:26:36.330170659Z" level=info msg="CreateContainer within sandbox \"6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:26:36.356981 env[1563]: time="2024-12-13T14:26:36.356925717Z" level=info msg="CreateContainer within sandbox \"6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"82c7c3b407d2bd37f2d3f36b971b82f8422cb9b33967ca3cd7aef2f3b875846e\"" Dec 13 14:26:36.359349 env[1563]: time="2024-12-13T14:26:36.357582531Z" level=info msg="StartContainer for \"82c7c3b407d2bd37f2d3f36b971b82f8422cb9b33967ca3cd7aef2f3b875846e\"" Dec 13 14:26:36.412369 systemd[1]: run-containerd-runc-k8s.io-82c7c3b407d2bd37f2d3f36b971b82f8422cb9b33967ca3cd7aef2f3b875846e-runc.V0rg0r.mount: Deactivated successfully. Dec 13 14:26:36.422982 systemd[1]: Started cri-containerd-82c7c3b407d2bd37f2d3f36b971b82f8422cb9b33967ca3cd7aef2f3b875846e.scope. Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7e6929bb18 items=0 ppid=4268 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:36.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832633763336234303764326264333766326433663336623937316238 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit: BPF prog-id=204 op=LOAD Dec 13 14:26:36.464000 audit[5074]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a8728 items=0 ppid=4268 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:36.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832633763336234303764326264333766326433663336623937316238 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.464000 audit: BPF prog-id=205 op=LOAD Dec 13 14:26:36.464000 audit[5074]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a8778 items=0 ppid=4268 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:36.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832633763336234303764326264333766326433663336623937316238 Dec 13 14:26:36.465000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:26:36.465000 audit: BPF prog-id=204 op=UNLOAD Dec 13 14:26:36.465000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.465000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.465000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.465000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.465000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.465000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.465000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.465000 audit[5074]: AVC avc: denied { perfmon } for pid=5074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.465000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.465000 audit[5074]: AVC avc: denied { bpf } for pid=5074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:36.465000 audit: BPF prog-id=206 op=LOAD Dec 13 14:26:36.465000 audit[5074]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a8808 items=0 ppid=4268 pid=5074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:36.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832633763336234303764326264333766326433663336623937316238 Dec 13 14:26:36.506611 env[1563]: time="2024-12-13T14:26:36.506551890Z" level=info msg="StartContainer for \"82c7c3b407d2bd37f2d3f36b971b82f8422cb9b33967ca3cd7aef2f3b875846e\" returns successfully" Dec 13 14:26:36.954255 kubelet[2645]: I1213 14:26:36.954210 2645 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:26:36.957327 kubelet[2645]: I1213 14:26:36.957297 2645 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:26:40.760019 systemd[1]: Started sshd@13-172.31.28.110:22-139.178.89.65:57828.service. Dec 13 14:26:40.766024 kernel: kauditd_printk_skb: 182 callbacks suppressed Dec 13 14:26:40.766120 kernel: audit: type=1130 audit(1734100000.758:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.110:22-139.178.89.65:57828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:40.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.110:22-139.178.89.65:57828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:41.065779 kernel: audit: type=1101 audit(1734100001.057:1400): pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.057000 audit[5115]: USER_ACCT pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.074800 sshd[5115]: Accepted publickey for core from 139.178.89.65 port 57828 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:41.078000 audit[5115]: CRED_ACQ pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.085966 kernel: audit: type=1103 audit(1734100001.078:1401): pid=5115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.091581 kernel: audit: type=1006 audit(1734100001.084:1402): pid=5115 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:26:41.098081 kernel: audit: type=1300 audit(1734100001.084:1402): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5c904350 a2=3 a3=0 items=0 ppid=1 pid=5115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:41.084000 audit[5115]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5c904350 a2=3 a3=0 items=0 ppid=1 pid=5115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:41.084000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:41.101730 kernel: audit: type=1327 audit(1734100001.084:1402): proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:41.102818 sshd[5115]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:41.114848 systemd[1]: Started session-14.scope. Dec 13 14:26:41.115574 systemd-logind[1556]: New session 14 of user core. Dec 13 14:26:41.133989 kernel: audit: type=1105 audit(1734100001.123:1403): pid=5115 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.141224 kernel: audit: type=1103 audit(1734100001.133:1404): pid=5117 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.123000 audit[5115]: USER_START pid=5115 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.133000 audit[5117]: CRED_ACQ pid=5117 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.806409 env[1563]: time="2024-12-13T14:26:41.806335895Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:41.811483 env[1563]: time="2024-12-13T14:26:41.811441026Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:41.815607 env[1563]: time="2024-12-13T14:26:41.815554320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:41.818908 env[1563]: time="2024-12-13T14:26:41.818866186Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:41.819511 env[1563]: time="2024-12-13T14:26:41.819463806Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:26:41.869030 env[1563]: time="2024-12-13T14:26:41.868547936Z" level=info msg="CreateContainer within sandbox \"a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:26:41.877303 sshd[5115]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:41.879000 audit[5115]: USER_END pid=5115 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.883696 systemd[1]: sshd@13-172.31.28.110:22-139.178.89.65:57828.service: Deactivated successfully. Dec 13 14:26:41.889606 kernel: audit: type=1106 audit(1734100001.879:1405): pid=5115 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.889723 kernel: audit: type=1104 audit(1734100001.879:1406): pid=5115 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.879000 audit[5115]: CRED_DISP pid=5115 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:41.884880 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:26:41.890694 systemd-logind[1556]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:26:41.892474 systemd-logind[1556]: Removed session 14. Dec 13 14:26:41.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.110:22-139.178.89.65:57828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:41.918422 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2950932055.mount: Deactivated successfully. Dec 13 14:26:41.926139 env[1563]: time="2024-12-13T14:26:41.926083846Z" level=info msg="CreateContainer within sandbox \"a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"3c81637cab3832dd959af700c9447f5753873a82b25ce934a36cda4e48c6401e\"" Dec 13 14:26:41.928396 env[1563]: time="2024-12-13T14:26:41.928353299Z" level=info msg="StartContainer for \"3c81637cab3832dd959af700c9447f5753873a82b25ce934a36cda4e48c6401e\"" Dec 13 14:26:41.955741 systemd[1]: Started cri-containerd-3c81637cab3832dd959af700c9447f5753873a82b25ce934a36cda4e48c6401e.scope. Dec 13 14:26:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.982000 audit: BPF prog-id=207 op=LOAD Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4896 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:41.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383136333763616233383332646439353961663730306339343437 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4896 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:41.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383136333763616233383332646439353961663730306339343437 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit: BPF prog-id=208 op=LOAD Dec 13 14:26:41.984000 audit[5135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003c00c0 items=0 ppid=4896 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:41.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383136333763616233383332646439353961663730306339343437 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit: BPF prog-id=209 op=LOAD Dec 13 14:26:41.984000 audit[5135]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003c0108 items=0 ppid=4896 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:41.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383136333763616233383332646439353961663730306339343437 Dec 13 14:26:41.984000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:26:41.984000 audit: BPF prog-id=208 op=UNLOAD Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { perfmon } for pid=5135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit[5135]: AVC avc: denied { bpf } for pid=5135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:41.984000 audit: BPF prog-id=210 op=LOAD Dec 13 14:26:41.984000 audit[5135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c0518 items=0 ppid=4896 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:41.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383136333763616233383332646439353961663730306339343437 Dec 13 14:26:42.026549 env[1563]: time="2024-12-13T14:26:42.026431201Z" level=info msg="StartContainer for \"3c81637cab3832dd959af700c9447f5753873a82b25ce934a36cda4e48c6401e\" returns successfully" Dec 13 14:26:42.326691 kubelet[2645]: I1213 14:26:42.326583 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-s6fcz" podStartSLOduration=47.754431224 podStartE2EDuration="58.326525567s" podCreationTimestamp="2024-12-13 14:25:44 +0000 UTC" firstStartedPulling="2024-12-13 14:26:25.744189445 +0000 UTC m=+62.526404270" lastFinishedPulling="2024-12-13 14:26:36.316283791 +0000 UTC m=+73.098498613" observedRunningTime="2024-12-13 14:26:37.290939699 +0000 UTC m=+74.073154560" watchObservedRunningTime="2024-12-13 14:26:42.326525567 +0000 UTC m=+79.108740398" Dec 13 14:26:42.327851 kubelet[2645]: I1213 14:26:42.327811 2645 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5684b959c9-4kqlh" podStartSLOduration=45.493013045 podStartE2EDuration="58.327766014s" podCreationTimestamp="2024-12-13 14:25:44 +0000 UTC" firstStartedPulling="2024-12-13 14:26:28.985186197 +0000 UTC m=+65.767401006" lastFinishedPulling="2024-12-13 14:26:41.819939149 +0000 UTC m=+78.602153975" observedRunningTime="2024-12-13 14:26:42.327258626 +0000 UTC m=+79.109473458" watchObservedRunningTime="2024-12-13 14:26:42.327766014 +0000 UTC m=+79.109980847" Dec 13 14:26:46.905849 systemd[1]: Started sshd@14-172.31.28.110:22-139.178.89.65:57836.service. Dec 13 14:26:46.913108 kernel: kauditd_printk_skb: 58 callbacks suppressed Dec 13 14:26:46.913248 kernel: audit: type=1130 audit(1734100006.904:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.110:22-139.178.89.65:57836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:46.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.110:22-139.178.89.65:57836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:47.134000 audit[5184]: USER_ACCT pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.147443 kernel: audit: type=1101 audit(1734100007.134:1427): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.147549 kernel: audit: type=1103 audit(1734100007.136:1428): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.136000 audit[5184]: CRED_ACQ pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.147705 sshd[5184]: Accepted publickey for core from 139.178.89.65 port 57836 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:47.142812 sshd[5184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:47.153692 kernel: audit: type=1006 audit(1734100007.136:1429): pid=5184 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:26:47.136000 audit[5184]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd25dc5510 a2=3 a3=0 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:47.159765 systemd-logind[1556]: New session 15 of user core. Dec 13 14:26:47.164627 kernel: audit: type=1300 audit(1734100007.136:1429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd25dc5510 a2=3 a3=0 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:47.161034 systemd[1]: Started session-15.scope. Dec 13 14:26:47.136000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:47.170010 kernel: audit: type=1327 audit(1734100007.136:1429): proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:47.169000 audit[5184]: USER_START pid=5184 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.176709 kernel: audit: type=1105 audit(1734100007.169:1430): pid=5184 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.172000 audit[5186]: CRED_ACQ pid=5186 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.182915 kernel: audit: type=1103 audit(1734100007.172:1431): pid=5186 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.489135 sshd[5184]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:47.489000 audit[5184]: USER_END pid=5184 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.496226 systemd[1]: sshd@14-172.31.28.110:22-139.178.89.65:57836.service: Deactivated successfully. Dec 13 14:26:47.497356 kernel: audit: type=1106 audit(1734100007.489:1432): pid=5184 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.497499 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:26:47.498441 systemd-logind[1556]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:26:47.489000 audit[5184]: CRED_DISP pid=5184 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:47.499487 systemd-logind[1556]: Removed session 15. Dec 13 14:26:47.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.110:22-139.178.89.65:57836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:47.505001 kernel: audit: type=1104 audit(1734100007.489:1433): pid=5184 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:49.313439 kubelet[2645]: I1213 14:26:49.313320 2645 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:26:49.397000 audit[5198]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=5198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:49.397000 audit[5198]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffee289dbd0 a2=0 a3=7ffee289dbbc items=0 ppid=2781 pid=5198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:49.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:49.402000 audit[5198]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=5198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:49.402000 audit[5198]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffee289dbd0 a2=0 a3=7ffee289dbbc items=0 ppid=2781 pid=5198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:49.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:52.515761 systemd[1]: Started sshd@15-172.31.28.110:22-139.178.89.65:51944.service. Dec 13 14:26:52.524986 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:26:52.525124 kernel: audit: type=1130 audit(1734100012.515:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.110:22-139.178.89.65:51944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:52.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.110:22-139.178.89.65:51944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:52.689000 audit[5200]: USER_ACCT pid=5200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:52.692293 sshd[5200]: Accepted publickey for core from 139.178.89.65 port 51944 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:52.701008 kernel: audit: type=1101 audit(1734100012.689:1438): pid=5200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:52.701237 kernel: audit: type=1103 audit(1734100012.695:1439): pid=5200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:52.701853 kernel: audit: type=1006 audit(1734100012.695:1440): pid=5200 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:26:52.695000 audit[5200]: CRED_ACQ pid=5200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:52.696526 sshd[5200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:52.695000 audit[5200]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe965b3730 a2=3 a3=0 items=0 ppid=1 pid=5200 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:52.695000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:52.714248 kernel: audit: type=1300 audit(1734100012.695:1440): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe965b3730 a2=3 a3=0 items=0 ppid=1 pid=5200 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:52.714331 kernel: audit: type=1327 audit(1734100012.695:1440): proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:52.720243 systemd-logind[1556]: New session 16 of user core. Dec 13 14:26:52.721783 systemd[1]: Started session-16.scope. Dec 13 14:26:52.731000 audit[5200]: USER_START pid=5200 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:52.739597 kernel: audit: type=1105 audit(1734100012.731:1441): pid=5200 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:52.739858 kernel: audit: type=1103 audit(1734100012.738:1442): pid=5202 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:52.738000 audit[5202]: CRED_ACQ pid=5202 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:53.017171 sshd[5200]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:53.019000 audit[5200]: USER_END pid=5200 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:53.023148 systemd[1]: sshd@15-172.31.28.110:22-139.178.89.65:51944.service: Deactivated successfully. Dec 13 14:26:53.024190 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:26:53.025813 kernel: audit: type=1106 audit(1734100013.019:1443): pid=5200 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:53.026103 kernel: audit: type=1104 audit(1734100013.019:1444): pid=5200 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:53.019000 audit[5200]: CRED_DISP pid=5200 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:53.027298 systemd-logind[1556]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:26:53.028717 systemd-logind[1556]: Removed session 16. Dec 13 14:26:53.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.110:22-139.178.89.65:51944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:53.043992 systemd[1]: Started sshd@16-172.31.28.110:22-139.178.89.65:51952.service. Dec 13 14:26:53.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.28.110:22-139.178.89.65:51952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:53.212000 audit[5212]: USER_ACCT pid=5212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:53.213489 sshd[5212]: Accepted publickey for core from 139.178.89.65 port 51952 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:53.213000 audit[5212]: CRED_ACQ pid=5212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:53.213000 audit[5212]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe84ac4f90 a2=3 a3=0 items=0 ppid=1 pid=5212 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:53.213000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:53.215049 sshd[5212]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:53.222241 systemd[1]: Started session-17.scope. Dec 13 14:26:53.223264 systemd-logind[1556]: New session 17 of user core. Dec 13 14:26:53.229000 audit[5212]: USER_START pid=5212 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:53.231000 audit[5214]: CRED_ACQ pid=5214 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:54.069449 sshd[5212]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:54.074000 audit[5212]: USER_END pid=5212 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:54.074000 audit[5212]: CRED_DISP pid=5212 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:54.081901 systemd[1]: run-containerd-runc-k8s.io-09cfbf1e65fbd834eb956c1ab5fa65cdcdc98b9da9bf8f7a15d00e3f45c06b8c-runc.jl7uAx.mount: Deactivated successfully. Dec 13 14:26:54.087589 systemd[1]: sshd@16-172.31.28.110:22-139.178.89.65:51952.service: Deactivated successfully. Dec 13 14:26:54.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.28.110:22-139.178.89.65:51952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:54.091029 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:26:54.105443 systemd-logind[1556]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:26:54.124775 systemd[1]: Started sshd@17-172.31.28.110:22-139.178.89.65:51964.service. Dec 13 14:26:54.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.28.110:22-139.178.89.65:51964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:54.129418 systemd-logind[1556]: Removed session 17. Dec 13 14:26:54.318000 audit[5237]: USER_ACCT pid=5237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:54.319614 sshd[5237]: Accepted publickey for core from 139.178.89.65 port 51964 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:54.326000 audit[5237]: CRED_ACQ pid=5237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:54.326000 audit[5237]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5942e490 a2=3 a3=0 items=0 ppid=1 pid=5237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:54.326000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:54.331456 sshd[5237]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:54.340356 systemd[1]: Started session-18.scope. Dec 13 14:26:54.341100 systemd-logind[1556]: New session 18 of user core. Dec 13 14:26:54.354000 audit[5237]: USER_START pid=5237 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:54.356000 audit[5243]: CRED_ACQ pid=5243 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:58.112258 systemd[1]: run-containerd-runc-k8s.io-3c81637cab3832dd959af700c9447f5753873a82b25ce934a36cda4e48c6401e-runc.Mf4sru.mount: Deactivated successfully. Dec 13 14:26:58.171472 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 14:26:58.177440 kernel: audit: type=1325 audit(1734100018.164:1461): table=filter:121 family=2 entries=20 op=nft_register_rule pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:58.179184 kernel: audit: type=1300 audit(1734100018.164:1461): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff416a3530 a2=0 a3=7fff416a351c items=0 ppid=2781 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:58.164000 audit[5276]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:58.164000 audit[5276]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff416a3530 a2=0 a3=7fff416a351c items=0 ppid=2781 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:58.188922 kernel: audit: type=1327 audit(1734100018.164:1461): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:58.189018 kernel: audit: type=1325 audit(1734100018.173:1462): table=nat:122 family=2 entries=22 op=nft_register_rule pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:58.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:58.173000 audit[5276]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:58.173000 audit[5276]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff416a3530 a2=0 a3=0 items=0 ppid=2781 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:58.197874 kernel: audit: type=1300 audit(1734100018.173:1462): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff416a3530 a2=0 a3=0 items=0 ppid=2781 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:58.207370 sshd[5237]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:58.213768 kernel: audit: type=1327 audit(1734100018.173:1462): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:58.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:58.216000 audit[5237]: USER_END pid=5237 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:58.222858 kernel: audit: type=1106 audit(1734100018.216:1463): pid=5237 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:58.230629 systemd[1]: sshd@17-172.31.28.110:22-139.178.89.65:51964.service: Deactivated successfully. Dec 13 14:26:58.223000 audit[5237]: CRED_DISP pid=5237 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:58.235861 kernel: audit: type=1104 audit(1734100018.223:1464): pid=5237 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:58.233724 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:26:58.234792 systemd-logind[1556]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:26:58.242721 kernel: audit: type=1131 audit(1734100018.230:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.28.110:22-139.178.89.65:51964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.28.110:22-139.178.89.65:51964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.254247 systemd[1]: Started sshd@18-172.31.28.110:22-139.178.89.65:41084.service. Dec 13 14:26:58.260639 kernel: audit: type=1130 audit(1734100018.254:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.110:22-139.178.89.65:41084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.110:22-139.178.89.65:41084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:58.256853 systemd-logind[1556]: Removed session 18. Dec 13 14:26:58.335000 audit[5282]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:58.335000 audit[5282]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdc3a3f7f0 a2=0 a3=7ffdc3a3f7dc items=0 ppid=2781 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:58.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:58.340000 audit[5282]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5282 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:58.340000 audit[5282]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdc3a3f7f0 a2=0 a3=0 items=0 ppid=2781 pid=5282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:58.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:58.487000 audit[5281]: USER_ACCT pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:58.489760 sshd[5281]: Accepted publickey for core from 139.178.89.65 port 41084 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:26:58.490000 audit[5281]: CRED_ACQ pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:58.490000 audit[5281]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc82650420 a2=3 a3=0 items=0 ppid=1 pid=5281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:58.490000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:58.492010 sshd[5281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:58.508558 systemd-logind[1556]: New session 19 of user core. Dec 13 14:26:58.509555 systemd[1]: Started session-19.scope. Dec 13 14:26:58.515000 audit[5281]: USER_START pid=5281 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:58.518000 audit[5287]: CRED_ACQ pid=5287 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:59.799770 sshd[5281]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:59.802000 audit[5281]: USER_END pid=5281 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:59.802000 audit[5281]: CRED_DISP pid=5281 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:26:59.813534 systemd[1]: sshd@18-172.31.28.110:22-139.178.89.65:41084.service: Deactivated successfully. Dec 13 14:26:59.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.110:22-139.178.89.65:41084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:59.815811 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:26:59.816396 systemd-logind[1556]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:26:59.817708 systemd-logind[1556]: Removed session 19. Dec 13 14:26:59.827141 systemd[1]: Started sshd@19-172.31.28.110:22-139.178.89.65:41098.service. Dec 13 14:26:59.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.28.110:22-139.178.89.65:41098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:00.017820 sshd[5301]: Accepted publickey for core from 139.178.89.65 port 41098 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:27:00.016000 audit[5301]: USER_ACCT pid=5301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:00.021000 audit[5301]: CRED_ACQ pid=5301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:00.021000 audit[5301]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe79777c30 a2=3 a3=0 items=0 ppid=1 pid=5301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:00.026624 sshd[5301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:00.040179 systemd[1]: Started session-20.scope. Dec 13 14:27:00.040739 systemd-logind[1556]: New session 20 of user core. Dec 13 14:27:00.049000 audit[5301]: USER_START pid=5301 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:00.052000 audit[5303]: CRED_ACQ pid=5303 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:00.429182 sshd[5301]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:00.430000 audit[5301]: USER_END pid=5301 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:00.430000 audit[5301]: CRED_DISP pid=5301 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:00.434142 systemd-logind[1556]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:27:00.436218 systemd[1]: sshd@19-172.31.28.110:22-139.178.89.65:41098.service: Deactivated successfully. Dec 13 14:27:00.437285 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:27:00.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.28.110:22-139.178.89.65:41098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:00.439434 systemd-logind[1556]: Removed session 20. Dec 13 14:27:02.068625 kernel: hrtimer: interrupt took 3701919 ns Dec 13 14:27:05.455273 systemd[1]: Started sshd@20-172.31.28.110:22-139.178.89.65:41106.service. Dec 13 14:27:05.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.110:22-139.178.89.65:41106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:05.456838 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 14:27:05.457069 kernel: audit: type=1130 audit(1734100025.454:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.110:22-139.178.89.65:41106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:05.586000 audit[5315]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:05.586000 audit[5315]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdf2d00df0 a2=0 a3=7ffdf2d00ddc items=0 ppid=2781 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:05.595254 kernel: audit: type=1325 audit(1734100025.586:1487): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:05.595342 kernel: audit: type=1300 audit(1734100025.586:1487): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdf2d00df0 a2=0 a3=7ffdf2d00ddc items=0 ppid=2781 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:05.598725 kernel: audit: type=1327 audit(1734100025.586:1487): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:05.586000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:05.599000 audit[5315]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:05.599000 audit[5315]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdf2d00df0 a2=0 a3=7ffdf2d00ddc items=0 ppid=2781 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:05.611990 kernel: audit: type=1325 audit(1734100025.599:1488): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:05.612126 kernel: audit: type=1300 audit(1734100025.599:1488): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdf2d00df0 a2=0 a3=7ffdf2d00ddc items=0 ppid=2781 pid=5315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:05.612318 kernel: audit: type=1327 audit(1734100025.599:1488): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:05.599000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:05.696626 sshd[5312]: Accepted publickey for core from 139.178.89.65 port 41106 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:27:05.695000 audit[5312]: USER_ACCT pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:05.697000 audit[5312]: CRED_ACQ pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:05.708374 kernel: audit: type=1101 audit(1734100025.695:1489): pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:05.708536 kernel: audit: type=1103 audit(1734100025.697:1490): pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:05.710657 sshd[5312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:05.713692 kernel: audit: type=1006 audit(1734100025.697:1491): pid=5312 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 14:27:05.697000 audit[5312]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7a3b6830 a2=3 a3=0 items=0 ppid=1 pid=5312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:05.697000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:05.721040 systemd[1]: Started session-21.scope. Dec 13 14:27:05.722802 systemd-logind[1556]: New session 21 of user core. Dec 13 14:27:05.737000 audit[5312]: USER_START pid=5312 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:05.739000 audit[5317]: CRED_ACQ pid=5317 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:06.147344 sshd[5312]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:06.149000 audit[5312]: USER_END pid=5312 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:06.149000 audit[5312]: CRED_DISP pid=5312 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:06.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.110:22-139.178.89.65:41106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:06.152224 systemd[1]: sshd@20-172.31.28.110:22-139.178.89.65:41106.service: Deactivated successfully. Dec 13 14:27:06.153124 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:27:06.154240 systemd-logind[1556]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:27:06.158096 systemd-logind[1556]: Removed session 21. Dec 13 14:27:11.181790 systemd[1]: Started sshd@21-172.31.28.110:22-139.178.89.65:51616.service. Dec 13 14:27:11.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.28.110:22-139.178.89.65:51616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:11.183352 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:27:11.183465 kernel: audit: type=1130 audit(1734100031.181:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.28.110:22-139.178.89.65:51616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:11.414000 audit[5331]: USER_ACCT pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.422346 sshd[5331]: Accepted publickey for core from 139.178.89.65 port 51616 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:27:11.431566 kernel: audit: type=1101 audit(1734100031.414:1498): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.431742 kernel: audit: type=1103 audit(1734100031.421:1499): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.431793 kernel: audit: type=1006 audit(1734100031.421:1500): pid=5331 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:27:11.438468 kernel: audit: type=1300 audit(1734100031.421:1500): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb31e9b50 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:11.421000 audit[5331]: CRED_ACQ pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.421000 audit[5331]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb31e9b50 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:11.423299 sshd[5331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:11.431552 systemd[1]: Started session-22.scope. Dec 13 14:27:11.442782 kernel: audit: type=1327 audit(1734100031.421:1500): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:11.421000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:11.435325 systemd-logind[1556]: New session 22 of user core. Dec 13 14:27:11.443000 audit[5331]: USER_START pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.454783 kernel: audit: type=1105 audit(1734100031.443:1501): pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.454000 audit[5333]: CRED_ACQ pid=5333 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.460695 kernel: audit: type=1103 audit(1734100031.454:1502): pid=5333 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.680845 sshd[5331]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:11.681000 audit[5331]: USER_END pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.686320 systemd[1]: sshd@21-172.31.28.110:22-139.178.89.65:51616.service: Deactivated successfully. Dec 13 14:27:11.687735 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:27:11.682000 audit[5331]: CRED_DISP pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.692764 systemd-logind[1556]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:27:11.695624 kernel: audit: type=1106 audit(1734100031.681:1503): pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.695818 kernel: audit: type=1104 audit(1734100031.682:1504): pid=5331 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:11.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.28.110:22-139.178.89.65:51616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:11.694821 systemd-logind[1556]: Removed session 22. Dec 13 14:27:15.307000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:15.307000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00269c660 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:27:15.307000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:15.308000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:15.308000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d1eff0 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:27:15.308000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:16.714836 systemd[1]: Started sshd@22-172.31.28.110:22-139.178.89.65:51626.service. Dec 13 14:27:16.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.28.110:22-139.178.89.65:51626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:16.716077 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:27:16.716169 kernel: audit: type=1130 audit(1734100036.714:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.28.110:22-139.178.89.65:51626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:16.898000 audit[5342]: USER_ACCT pid=5342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:16.904481 sshd[5342]: Accepted publickey for core from 139.178.89.65 port 51626 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:27:16.905074 kernel: audit: type=1101 audit(1734100036.898:1509): pid=5342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:16.903000 audit[5342]: CRED_ACQ pid=5342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:16.905684 sshd[5342]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:16.916021 kernel: audit: type=1103 audit(1734100036.903:1510): pid=5342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:16.917195 kernel: audit: type=1006 audit(1734100036.903:1511): pid=5342 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:27:16.903000 audit[5342]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde5c5a160 a2=3 a3=0 items=0 ppid=1 pid=5342 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:16.903000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:16.928062 systemd[1]: Started session-23.scope. Dec 13 14:27:16.930734 kernel: audit: type=1300 audit(1734100036.903:1511): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde5c5a160 a2=3 a3=0 items=0 ppid=1 pid=5342 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:16.932417 kernel: audit: type=1327 audit(1734100036.903:1511): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:16.929954 systemd-logind[1556]: New session 23 of user core. Dec 13 14:27:16.943000 audit[5342]: USER_START pid=5342 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:16.950978 kernel: audit: type=1105 audit(1734100036.943:1512): pid=5342 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:16.950000 audit[5344]: CRED_ACQ pid=5344 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:16.955692 kernel: audit: type=1103 audit(1734100036.950:1513): pid=5344 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:17.157000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:17.157000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0109047a0 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:27:17.169522 kernel: audit: type=1400 audit(1734100037.157:1514): avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:17.169760 kernel: audit: type=1300 audit(1734100037.157:1514): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0109047a0 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:27:17.157000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:27:17.162000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:17.162000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0148353e0 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:27:17.162000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:27:17.162000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:17.162000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c013fb6b70 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:27:17.162000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:27:17.170000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:17.170000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0109047c0 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:27:17.170000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:27:17.174000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:17.174000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c013fb6c60 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:27:17.174000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:27:17.175000 audit[2374]: AVC avc: denied { watch } for pid=2374 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:17.175000 audit[2374]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c014835560 a2=fc6 a3=0 items=0 ppid=2237 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c649 key=(null) Dec 13 14:27:17.175000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:27:17.205456 sshd[5342]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:17.207000 audit[5342]: USER_END pid=5342 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:17.207000 audit[5342]: CRED_DISP pid=5342 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:17.210070 systemd[1]: sshd@22-172.31.28.110:22-139.178.89.65:51626.service: Deactivated successfully. Dec 13 14:27:17.210995 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:27:17.211540 systemd-logind[1556]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:27:17.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.28.110:22-139.178.89.65:51626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:17.214028 systemd-logind[1556]: Removed session 23. Dec 13 14:27:21.480000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:21.480000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026673a0 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:27:21.480000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:21.482000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:21.482000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026673c0 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:27:21.482000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:21.489000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:21.489000 audit[2405]: AVC avc: denied { watch } for pid=2405 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:21.489000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002667560 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:27:21.489000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:21.489000 audit[2405]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00269d780 a2=fc6 a3=0 items=0 ppid=2270 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c407,c649 key=(null) Dec 13 14:27:21.489000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:22.238588 systemd[1]: Started sshd@23-172.31.28.110:22-139.178.89.65:53438.service. Dec 13 14:27:22.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.28.110:22-139.178.89.65:53438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:22.246705 kernel: kauditd_printk_skb: 31 callbacks suppressed Dec 13 14:27:22.246825 kernel: audit: type=1130 audit(1734100042.238:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.28.110:22-139.178.89.65:53438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:22.414000 audit[5354]: USER_ACCT pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.416491 sshd[5354]: Accepted publickey for core from 139.178.89.65 port 53438 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:27:22.426908 kernel: audit: type=1101 audit(1734100042.414:1528): pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.429000 audit[5354]: CRED_ACQ pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.432020 sshd[5354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:22.440018 kernel: audit: type=1103 audit(1734100042.429:1529): pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.440157 kernel: audit: type=1006 audit(1734100042.429:1530): pid=5354 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:27:22.429000 audit[5354]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb3f155c0 a2=3 a3=0 items=0 ppid=1 pid=5354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:22.448554 kernel: audit: type=1300 audit(1734100042.429:1530): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb3f155c0 a2=3 a3=0 items=0 ppid=1 pid=5354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:22.448767 kernel: audit: type=1327 audit(1734100042.429:1530): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:22.429000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:22.447824 systemd[1]: Started session-24.scope. Dec 13 14:27:22.449237 systemd-logind[1556]: New session 24 of user core. Dec 13 14:27:22.456000 audit[5354]: USER_START pid=5354 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.456000 audit[5356]: CRED_ACQ pid=5356 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.466994 kernel: audit: type=1105 audit(1734100042.456:1531): pid=5354 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.467118 kernel: audit: type=1103 audit(1734100042.456:1532): pid=5356 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.670554 sshd[5354]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:22.671000 audit[5354]: USER_END pid=5354 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.671000 audit[5354]: CRED_DISP pid=5354 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.679454 systemd[1]: sshd@23-172.31.28.110:22-139.178.89.65:53438.service: Deactivated successfully. Dec 13 14:27:22.680650 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:27:22.682795 kernel: audit: type=1106 audit(1734100042.671:1533): pid=5354 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.682865 kernel: audit: type=1104 audit(1734100042.671:1534): pid=5354 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:22.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.28.110:22-139.178.89.65:53438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:22.683251 systemd-logind[1556]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:27:22.684586 systemd-logind[1556]: Removed session 24. Dec 13 14:27:23.662658 env[1563]: time="2024-12-13T14:27:23.662614644Z" level=info msg="StopPodSandbox for \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\"" Dec 13 14:27:24.075196 systemd[1]: run-containerd-runc-k8s.io-09cfbf1e65fbd834eb956c1ab5fa65cdcdc98b9da9bf8f7a15d00e3f45c06b8c-runc.33c1G8.mount: Deactivated successfully. Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.322 [WARNING][5380] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0", GenerateName:"calico-kube-controllers-5684b959c9-", Namespace:"calico-system", SelfLink:"", UID:"00f39773-a08d-4d77-9373-3af4490cf007", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5684b959c9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0", Pod:"calico-kube-controllers-5684b959c9-4kqlh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0481c3ecb85", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.329 [INFO][5380] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.329 [INFO][5380] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" iface="eth0" netns="" Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.329 [INFO][5380] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.330 [INFO][5380] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.701 [INFO][5407] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" HandleID="k8s-pod-network.d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.704 [INFO][5407] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.705 [INFO][5407] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.726 [WARNING][5407] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" HandleID="k8s-pod-network.d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.727 [INFO][5407] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" HandleID="k8s-pod-network.d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.729 [INFO][5407] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:24.737384 env[1563]: 2024-12-13 14:27:24.733 [INFO][5380] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:27:24.743932 env[1563]: time="2024-12-13T14:27:24.737459544Z" level=info msg="TearDown network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\" successfully" Dec 13 14:27:24.743932 env[1563]: time="2024-12-13T14:27:24.737535423Z" level=info msg="StopPodSandbox for \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\" returns successfully" Dec 13 14:27:24.786073 env[1563]: time="2024-12-13T14:27:24.786022568Z" level=info msg="RemovePodSandbox for \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\"" Dec 13 14:27:24.786257 env[1563]: time="2024-12-13T14:27:24.786074886Z" level=info msg="Forcibly stopping sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\"" Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:24.868 [WARNING][5426] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0", GenerateName:"calico-kube-controllers-5684b959c9-", Namespace:"calico-system", SelfLink:"", UID:"00f39773-a08d-4d77-9373-3af4490cf007", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5684b959c9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"a1195f4076dac7b4e3e64b3fe1fc69a5eee6f9e288a5ff048135ef2c5d3e97e0", Pod:"calico-kube-controllers-5684b959c9-4kqlh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0481c3ecb85", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:24.869 [INFO][5426] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:24.869 [INFO][5426] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" iface="eth0" netns="" Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:24.869 [INFO][5426] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:24.869 [INFO][5426] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:24.979 [INFO][5432] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" HandleID="k8s-pod-network.d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:24.979 [INFO][5432] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:24.979 [INFO][5432] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:25.004 [WARNING][5432] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" HandleID="k8s-pod-network.d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:25.004 [INFO][5432] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" HandleID="k8s-pod-network.d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Workload="ip--172--31--28--110-k8s-calico--kube--controllers--5684b959c9--4kqlh-eth0" Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:25.007 [INFO][5432] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:25.017289 env[1563]: 2024-12-13 14:27:25.011 [INFO][5426] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed" Dec 13 14:27:25.022971 env[1563]: time="2024-12-13T14:27:25.022912471Z" level=info msg="TearDown network for sandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\" successfully" Dec 13 14:27:25.039165 env[1563]: time="2024-12-13T14:27:25.039019512Z" level=info msg="RemovePodSandbox \"d10b1ef25df1866c196711ad8e79c12f2cf9612cbb3b75f8c0d0ee2c2063c4ed\" returns successfully" Dec 13 14:27:25.041728 env[1563]: time="2024-12-13T14:27:25.041680990Z" level=info msg="StopPodSandbox for \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\"" Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.207 [WARNING][5451] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"fb613f52-6627-4d24-8dbd-721f760f95a9", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15", Pod:"coredns-76f75df574-lbzkq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali956b42db0ee", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.208 [INFO][5451] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.208 [INFO][5451] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" iface="eth0" netns="" Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.208 [INFO][5451] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.208 [INFO][5451] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.268 [INFO][5458] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" HandleID="k8s-pod-network.1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.268 [INFO][5458] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.269 [INFO][5458] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.281 [WARNING][5458] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" HandleID="k8s-pod-network.1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.281 [INFO][5458] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" HandleID="k8s-pod-network.1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.284 [INFO][5458] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:25.292310 env[1563]: 2024-12-13 14:27:25.287 [INFO][5451] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:27:25.292310 env[1563]: time="2024-12-13T14:27:25.292275921Z" level=info msg="TearDown network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\" successfully" Dec 13 14:27:25.296263 env[1563]: time="2024-12-13T14:27:25.292314368Z" level=info msg="StopPodSandbox for \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\" returns successfully" Dec 13 14:27:25.296263 env[1563]: time="2024-12-13T14:27:25.293178950Z" level=info msg="RemovePodSandbox for \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\"" Dec 13 14:27:25.296263 env[1563]: time="2024-12-13T14:27:25.293217233Z" level=info msg="Forcibly stopping sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\"" Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.375 [WARNING][5476] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"fb613f52-6627-4d24-8dbd-721f760f95a9", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"03b155e0bef4efd7f707861095c847ea81bc1b23687f7c970fd7ef241e7b9a15", Pod:"coredns-76f75df574-lbzkq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali956b42db0ee", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.376 [INFO][5476] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.376 [INFO][5476] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" iface="eth0" netns="" Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.376 [INFO][5476] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.376 [INFO][5476] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.453 [INFO][5482] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" HandleID="k8s-pod-network.1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.453 [INFO][5482] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.453 [INFO][5482] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.461 [WARNING][5482] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" HandleID="k8s-pod-network.1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.461 [INFO][5482] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" HandleID="k8s-pod-network.1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--lbzkq-eth0" Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.464 [INFO][5482] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:25.469219 env[1563]: 2024-12-13 14:27:25.466 [INFO][5476] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca" Dec 13 14:27:25.470941 env[1563]: time="2024-12-13T14:27:25.469681316Z" level=info msg="TearDown network for sandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\" successfully" Dec 13 14:27:25.477202 env[1563]: time="2024-12-13T14:27:25.477116676Z" level=info msg="RemovePodSandbox \"1275134a6b24d6ecd6ffa38cf57082192ebeebc628aa083a975dc9f4b50caaca\" returns successfully" Dec 13 14:27:25.478379 env[1563]: time="2024-12-13T14:27:25.478341593Z" level=info msg="StopPodSandbox for \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\"" Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.557 [WARNING][5503] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b73bff90-b7f9-4979-8202-4d0b0fbdadf1", ResourceVersion:"888", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3", Pod:"coredns-76f75df574-q5zdp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5c9b824aba2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.558 [INFO][5503] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.558 [INFO][5503] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" iface="eth0" netns="" Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.558 [INFO][5503] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.558 [INFO][5503] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.624 [INFO][5509] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" HandleID="k8s-pod-network.e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.624 [INFO][5509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.624 [INFO][5509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.638 [WARNING][5509] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" HandleID="k8s-pod-network.e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.638 [INFO][5509] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" HandleID="k8s-pod-network.e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.642 [INFO][5509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:25.648894 env[1563]: 2024-12-13 14:27:25.645 [INFO][5503] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:27:25.649794 env[1563]: time="2024-12-13T14:27:25.649745662Z" level=info msg="TearDown network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\" successfully" Dec 13 14:27:25.655793 env[1563]: time="2024-12-13T14:27:25.655747806Z" level=info msg="StopPodSandbox for \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\" returns successfully" Dec 13 14:27:25.656282 env[1563]: time="2024-12-13T14:27:25.656250215Z" level=info msg="RemovePodSandbox for \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\"" Dec 13 14:27:25.656395 env[1563]: time="2024-12-13T14:27:25.656290852Z" level=info msg="Forcibly stopping sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\"" Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.737 [WARNING][5528] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"b73bff90-b7f9-4979-8202-4d0b0fbdadf1", ResourceVersion:"888", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"af6bf4e1bc66e98e18e09c409fb98fb59617898f1561e068b9eef3e0ea1125d3", Pod:"coredns-76f75df574-q5zdp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5c9b824aba2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.737 [INFO][5528] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.737 [INFO][5528] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" iface="eth0" netns="" Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.737 [INFO][5528] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.738 [INFO][5528] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.805 [INFO][5534] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" HandleID="k8s-pod-network.e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.805 [INFO][5534] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.805 [INFO][5534] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.816 [WARNING][5534] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" HandleID="k8s-pod-network.e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.816 [INFO][5534] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" HandleID="k8s-pod-network.e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Workload="ip--172--31--28--110-k8s-coredns--76f75df574--q5zdp-eth0" Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.821 [INFO][5534] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:25.826119 env[1563]: 2024-12-13 14:27:25.823 [INFO][5528] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b" Dec 13 14:27:25.827348 env[1563]: time="2024-12-13T14:27:25.826153113Z" level=info msg="TearDown network for sandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\" successfully" Dec 13 14:27:25.832315 env[1563]: time="2024-12-13T14:27:25.832265755Z" level=info msg="RemovePodSandbox \"e4235ab32586c4e5bed7a9bb894428a0947c50ca951edbe4220a5db30c71337b\" returns successfully" Dec 13 14:27:25.833733 env[1563]: time="2024-12-13T14:27:25.833679900Z" level=info msg="StopPodSandbox for \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\"" Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.916 [WARNING][5555] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0", GenerateName:"calico-apiserver-6894cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"7f4eab33-6c5f-495d-be39-ef9019e2885c", ResourceVersion:"1051", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6894cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1", Pod:"calico-apiserver-6894cd8877-5cdtx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali285559472fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.916 [INFO][5555] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.916 [INFO][5555] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" iface="eth0" netns="" Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.919 [INFO][5555] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.919 [INFO][5555] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.967 [INFO][5561] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" HandleID="k8s-pod-network.c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.968 [INFO][5561] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.968 [INFO][5561] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.974 [WARNING][5561] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" HandleID="k8s-pod-network.c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.974 [INFO][5561] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" HandleID="k8s-pod-network.c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.979 [INFO][5561] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:25.987766 env[1563]: 2024-12-13 14:27:25.982 [INFO][5555] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:27:25.987766 env[1563]: time="2024-12-13T14:27:25.986179782Z" level=info msg="TearDown network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\" successfully" Dec 13 14:27:25.987766 env[1563]: time="2024-12-13T14:27:25.986217382Z" level=info msg="StopPodSandbox for \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\" returns successfully" Dec 13 14:27:25.990223 env[1563]: time="2024-12-13T14:27:25.990174949Z" level=info msg="RemovePodSandbox for \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\"" Dec 13 14:27:25.990351 env[1563]: time="2024-12-13T14:27:25.990229518Z" level=info msg="Forcibly stopping sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\"" Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.125 [WARNING][5581] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0", GenerateName:"calico-apiserver-6894cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"7f4eab33-6c5f-495d-be39-ef9019e2885c", ResourceVersion:"1051", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6894cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"2ec37c9e58786bce4af5cc3713ddd74f3c60797e92b1443ddc16cf545b7c4aa1", Pod:"calico-apiserver-6894cd8877-5cdtx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali285559472fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.126 [INFO][5581] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.126 [INFO][5581] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" iface="eth0" netns="" Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.126 [INFO][5581] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.126 [INFO][5581] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.194 [INFO][5587] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" HandleID="k8s-pod-network.c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.195 [INFO][5587] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.195 [INFO][5587] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.209 [WARNING][5587] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" HandleID="k8s-pod-network.c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.209 [INFO][5587] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" HandleID="k8s-pod-network.c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--5cdtx-eth0" Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.212 [INFO][5587] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:26.218040 env[1563]: 2024-12-13 14:27:26.215 [INFO][5581] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec" Dec 13 14:27:26.219404 env[1563]: time="2024-12-13T14:27:26.218084716Z" level=info msg="TearDown network for sandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\" successfully" Dec 13 14:27:26.224649 env[1563]: time="2024-12-13T14:27:26.224362879Z" level=info msg="RemovePodSandbox \"c45872b8aef75126b8e1b23019adf3808851e9ff4659b5bb1c76f8a66247f7ec\" returns successfully" Dec 13 14:27:26.225190 env[1563]: time="2024-12-13T14:27:26.225152720Z" level=info msg="StopPodSandbox for \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\"" Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.315 [WARNING][5606] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"797ccd89-3053-4e0b-b83c-d48e6ae1f519", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854", Pod:"csi-node-driver-s6fcz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic7574345e6b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.315 [INFO][5606] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.315 [INFO][5606] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" iface="eth0" netns="" Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.315 [INFO][5606] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.315 [INFO][5606] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.396 [INFO][5612] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" HandleID="k8s-pod-network.2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.396 [INFO][5612] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.397 [INFO][5612] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.409 [WARNING][5612] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" HandleID="k8s-pod-network.2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.410 [INFO][5612] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" HandleID="k8s-pod-network.2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.414 [INFO][5612] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:26.420329 env[1563]: 2024-12-13 14:27:26.417 [INFO][5606] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:27:26.422093 env[1563]: time="2024-12-13T14:27:26.420893363Z" level=info msg="TearDown network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\" successfully" Dec 13 14:27:26.422093 env[1563]: time="2024-12-13T14:27:26.420937701Z" level=info msg="StopPodSandbox for \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\" returns successfully" Dec 13 14:27:26.422374 env[1563]: time="2024-12-13T14:27:26.422341621Z" level=info msg="RemovePodSandbox for \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\"" Dec 13 14:27:26.422530 env[1563]: time="2024-12-13T14:27:26.422488985Z" level=info msg="Forcibly stopping sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\"" Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.549 [WARNING][5632] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"797ccd89-3053-4e0b-b83c-d48e6ae1f519", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"6d06c7a9013e858957473f1ba76ce301d6f42850e4805256b5ab66f9f07e2854", Pod:"csi-node-driver-s6fcz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calic7574345e6b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.551 [INFO][5632] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.551 [INFO][5632] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" iface="eth0" netns="" Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.551 [INFO][5632] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.551 [INFO][5632] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.608 [INFO][5638] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" HandleID="k8s-pod-network.2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.609 [INFO][5638] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.609 [INFO][5638] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.620 [WARNING][5638] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" HandleID="k8s-pod-network.2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.620 [INFO][5638] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" HandleID="k8s-pod-network.2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Workload="ip--172--31--28--110-k8s-csi--node--driver--s6fcz-eth0" Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.623 [INFO][5638] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:26.629071 env[1563]: 2024-12-13 14:27:26.626 [INFO][5632] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2" Dec 13 14:27:26.630168 env[1563]: time="2024-12-13T14:27:26.629114396Z" level=info msg="TearDown network for sandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\" successfully" Dec 13 14:27:26.639346 env[1563]: time="2024-12-13T14:27:26.639287368Z" level=info msg="RemovePodSandbox \"2838efb31b1bda248d81a5c54a963d4db4fdf1551bdd2d8f665c0eb6d5a690b2\" returns successfully" Dec 13 14:27:26.640187 env[1563]: time="2024-12-13T14:27:26.640148492Z" level=info msg="StopPodSandbox for \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\"" Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.739 [WARNING][5656] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0", GenerateName:"calico-apiserver-6894cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"dfb2bde3-020b-4bbe-afb2-09f9d51b7e98", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6894cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36", Pod:"calico-apiserver-6894cd8877-mdgpx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali64afe7dff74", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.740 [INFO][5656] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.740 [INFO][5656] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" iface="eth0" netns="" Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.740 [INFO][5656] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.740 [INFO][5656] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.785 [INFO][5663] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" HandleID="k8s-pod-network.791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.785 [INFO][5663] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.785 [INFO][5663] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.795 [WARNING][5663] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" HandleID="k8s-pod-network.791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.795 [INFO][5663] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" HandleID="k8s-pod-network.791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.798 [INFO][5663] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:26.803556 env[1563]: 2024-12-13 14:27:26.800 [INFO][5656] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:27:26.803556 env[1563]: time="2024-12-13T14:27:26.803527688Z" level=info msg="TearDown network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\" successfully" Dec 13 14:27:26.804286 env[1563]: time="2024-12-13T14:27:26.803564904Z" level=info msg="StopPodSandbox for \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\" returns successfully" Dec 13 14:27:26.804286 env[1563]: time="2024-12-13T14:27:26.804071031Z" level=info msg="RemovePodSandbox for \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\"" Dec 13 14:27:26.804286 env[1563]: time="2024-12-13T14:27:26.804106654Z" level=info msg="Forcibly stopping sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\"" Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.890 [WARNING][5684] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0", GenerateName:"calico-apiserver-6894cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"dfb2bde3-020b-4bbe-afb2-09f9d51b7e98", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6894cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-110", ContainerID:"755947619bc2a7f209fd6659f3efe57da535ac9237d7d37451e6c69c78687f36", Pod:"calico-apiserver-6894cd8877-mdgpx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali64afe7dff74", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.892 [INFO][5684] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.892 [INFO][5684] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" iface="eth0" netns="" Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.892 [INFO][5684] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.892 [INFO][5684] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.935 [INFO][5690] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" HandleID="k8s-pod-network.791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.936 [INFO][5690] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.936 [INFO][5690] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.949 [WARNING][5690] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" HandleID="k8s-pod-network.791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.949 [INFO][5690] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" HandleID="k8s-pod-network.791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Workload="ip--172--31--28--110-k8s-calico--apiserver--6894cd8877--mdgpx-eth0" Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.960 [INFO][5690] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:26.986161 env[1563]: 2024-12-13 14:27:26.968 [INFO][5684] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27" Dec 13 14:27:26.991234 env[1563]: time="2024-12-13T14:27:26.991183077Z" level=info msg="TearDown network for sandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\" successfully" Dec 13 14:27:27.000122 env[1563]: time="2024-12-13T14:27:26.999968792Z" level=info msg="RemovePodSandbox \"791876fb44ee992388a7d089e396ac60f9248cfc53da13ebb841deb9ed127c27\" returns successfully" Dec 13 14:27:27.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.28.110:22-139.178.89.65:53450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:27.704971 systemd[1]: Started sshd@24-172.31.28.110:22-139.178.89.65:53450.service. Dec 13 14:27:27.706181 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:27:27.706232 kernel: audit: type=1130 audit(1734100047.704:1536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.28.110:22-139.178.89.65:53450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:27.959000 audit[5697]: USER_ACCT pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:27.960699 sshd[5697]: Accepted publickey for core from 139.178.89.65 port 53450 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:27:27.972695 kernel: audit: type=1101 audit(1734100047.959:1537): pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:27.974000 audit[5697]: CRED_ACQ pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:27.989757 kernel: audit: type=1103 audit(1734100047.974:1538): pid=5697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:27.989934 sshd[5697]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:28.000215 kernel: audit: type=1006 audit(1734100047.974:1539): pid=5697 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:27:28.000355 kernel: audit: type=1300 audit(1734100047.974:1539): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd31526920 a2=3 a3=0 items=0 ppid=1 pid=5697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:27.974000 audit[5697]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd31526920 a2=3 a3=0 items=0 ppid=1 pid=5697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:27.974000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:28.015795 kernel: audit: type=1327 audit(1734100047.974:1539): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:28.021416 systemd-logind[1556]: New session 25 of user core. Dec 13 14:27:28.028909 systemd[1]: Started session-25.scope. Dec 13 14:27:28.040000 audit[5697]: USER_START pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:28.057984 kernel: audit: type=1105 audit(1734100048.040:1540): pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:28.058127 kernel: audit: type=1103 audit(1734100048.055:1541): pid=5699 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:28.055000 audit[5699]: CRED_ACQ pid=5699 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:28.085128 systemd[1]: run-containerd-runc-k8s.io-3c81637cab3832dd959af700c9447f5753873a82b25ce934a36cda4e48c6401e-runc.I2wUEl.mount: Deactivated successfully. Dec 13 14:27:28.412739 sshd[5697]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:28.414000 audit[5697]: USER_END pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:28.418839 systemd[1]: sshd@24-172.31.28.110:22-139.178.89.65:53450.service: Deactivated successfully. Dec 13 14:27:28.414000 audit[5697]: CRED_DISP pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:28.419943 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:27:28.422548 systemd-logind[1556]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:27:28.424048 systemd-logind[1556]: Removed session 25. Dec 13 14:27:28.424991 kernel: audit: type=1106 audit(1734100048.414:1542): pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:28.425065 kernel: audit: type=1104 audit(1734100048.414:1543): pid=5697 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:28.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.28.110:22-139.178.89.65:53450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.743372 systemd[1]: run-containerd-runc-k8s.io-3c81637cab3832dd959af700c9447f5753873a82b25ce934a36cda4e48c6401e-runc.QoxyvL.mount: Deactivated successfully. Dec 13 14:27:33.453403 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:27:33.453556 kernel: audit: type=1130 audit(1734100053.444:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.28.110:22-139.178.89.65:35060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.28.110:22-139.178.89.65:35060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.446184 systemd[1]: Started sshd@25-172.31.28.110:22-139.178.89.65:35060.service. Dec 13 14:27:33.614000 audit[5753]: USER_ACCT pid=5753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.616697 sshd[5753]: Accepted publickey for core from 139.178.89.65 port 35060 ssh2: RSA SHA256:kjZzhLCfrUb6HP3VZI7nfxYjuxqu9bKyQNrCGPkPDkk Dec 13 14:27:33.625910 kernel: audit: type=1101 audit(1734100053.614:1546): pid=5753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.627000 audit[5753]: CRED_ACQ pid=5753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.630383 sshd[5753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:33.648812 kernel: audit: type=1103 audit(1734100053.627:1547): pid=5753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.649067 kernel: audit: type=1006 audit(1734100053.629:1548): pid=5753 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:27:33.649246 kernel: audit: type=1300 audit(1734100053.629:1548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc67956290 a2=3 a3=0 items=0 ppid=1 pid=5753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:33.629000 audit[5753]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc67956290 a2=3 a3=0 items=0 ppid=1 pid=5753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:33.652983 systemd[1]: Started session-26.scope. Dec 13 14:27:33.655882 kernel: audit: type=1327 audit(1734100053.629:1548): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:33.629000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:33.654781 systemd-logind[1556]: New session 26 of user core. Dec 13 14:27:33.663000 audit[5753]: USER_START pid=5753 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.669000 audit[5755]: CRED_ACQ pid=5755 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.680366 kernel: audit: type=1105 audit(1734100053.663:1549): pid=5753 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.681145 kernel: audit: type=1103 audit(1734100053.669:1550): pid=5755 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.894258 sshd[5753]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:33.896000 audit[5753]: USER_END pid=5753 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.896000 audit[5753]: CRED_DISP pid=5753 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.905455 systemd[1]: sshd@25-172.31.28.110:22-139.178.89.65:35060.service: Deactivated successfully. Dec 13 14:27:33.907314 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:27:33.909714 kernel: audit: type=1106 audit(1734100053.896:1551): pid=5753 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.909895 kernel: audit: type=1104 audit(1734100053.896:1552): pid=5753 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:27:33.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.28.110:22-139.178.89.65:35060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:33.916352 systemd-logind[1556]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:27:33.921275 systemd-logind[1556]: Removed session 26. Dec 13 14:27:35.181000 audit[4983]: AVC avc: denied { watch } for pid=4983 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_25_57.2589500038/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c560,c831 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c560,c831 tclass=file permissive=0 Dec 13 14:27:35.181000 audit[4983]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00097f840 a2=fc6 a3=0 items=0 ppid=4538 pid=4983 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c560,c831 key=(null) Dec 13 14:27:35.181000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:27:35.483000 audit[5021]: AVC avc: denied { watch } for pid=5021 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_25_57.845800746/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c874,c938 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c874,c938 tclass=file permissive=0 Dec 13 14:27:35.483000 audit[5021]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023d8cc0 a2=fc6 a3=0 items=0 ppid=4565 pid=5021 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c874,c938 key=(null) Dec 13 14:27:35.483000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274